Security Watch

Microsoft's Rushed Full Disclosure Patches Found Just as Effective

Publicity gets Redmond's attention better than private disclosure of its vulnerabilities.

Hacking
Brian Krebbs at the Washington Post recently published information in his Security Fix blog regarding the time Microsoft needed to fix what it (Microsoft) classified as "critical" fixes. In the data, he observed that Microsoft appeared to be producing fixes much faster when it learned of the vulnerabilities through full disclosure, versus receiving the vulnerability details in private (referred to as responsible disclosure). The data showed that the time to fix was decreasing year-over-year for full-disclosure patches since 2003.

Krebbs went on to note: "Security Fix did not attempt to determine whether there was a correlation between the speed with which Microsoft issues patches and the quality or effectiveness of those updates. A real glutton for punishment might be able to learn just how many Windows patches were later updated with subsequent fixes -- either because the initial patch failed to fully fix the problem or introduced new troubles."

(Read the full article here -- registration may be required)

The Cybertrust Risk Intel Team decided we'd be the "glutton for punishment." We had that data readily available to us, as part of our extensive research information. A number of interesting things came to light:

None of the so-called "full disclosure" patches have ever resulted in a re-release of that patch. MS not only got it done more quickly, but they also appeared to get it done more correctly than when they had endless amounts of time to release a patch.

Year-over-year, the number of re-releases have remained relatively unchanged: 2003 saw eight re-releases, 2004 had six and 2005 also had six. Of course, we have to remember that we may still see re-releases to patches from these years, as it is not uncommon for Microsoft to do a re-release many months after a patch was originally released.

It's difficult to qualify the patches that are requiring the re-releases. They are, on average (or median), patches that took less than the average report time to fix, but more than the average disclosure time to fix. The average report time to fix in days for patches that were re-released was 73.142 in 2003, 175.4 in 2004 and 102.333 in 2005.

Overall, since the beginning of 2003, Microsoft has done a reasonable job of getting its patches right the first time and is getting marginally better at it over time (79 percent, 83 percent and 84 percent over the past three years). Its problems don't seem to lie in the full disclosure debate -- in fact, full disclosure and the shorter time to release seem to result in better version 1.0 patches. The problems with having more time to fix a problem could be related to the number of other changes that occur in the OS or applications during that time. By the time the fix is released, other components may have changed and could affect the functionality of the patch.

While it may appear that initial disclosure to the public results in a more efficient patch cycle, it's important to note that no attempt was made to correlate attacks or victims against these disclosures. It may well be that the faster patches were due to the fact that victims were being reported to Microsoft, which would certainly explain a number of these findings.

One caveat: No attempt was made to determine the reasons for the re-releases. We referenced only those that produced new binaries for a given patch. Sometimes those new binaries were simply for operating system or application versions for which patches were not originally produced.

Malicious Code
Symantec Corp. has shipped an update to its Norton SystemWorks program to eliminate a rootkit-type feature it included, allowing Norton to hide a directory from the Windows API. The directory was intended to be a location for the program to store files Norton wanted to ensure customers would not delete -- but it could also be used by malware criminals to hide their malware.

Privacy
Fitography is a new Web service that trolls other peer-to-peer networks to collect pictures and images it finds there. It then makes those pictures available on its own site. Experts say the site could easily break laws in a variety of countries if images turned out to be, for example, child pornography. There is also the possibility of copyright violations. The U.K.'s Data Protection Act, for example, also requires that a person's consent is granted prior to divulging any personal information.

Want More Security?

This column was originally published in our weekly Security Watch newsletter. To subscribe, click here.

One really has to wonder what the point of this new service really is. Images are the least compressible data on the Internet, so they're going to chew up a lot of bandwidth and server storage capacity gathering. Metadata on images is also, typically, difficult to glean from the images themselves, so how are you supposed to search through the masses of images they may have to make any use of them?

On the other hand, if they keep records of where they got what, then they certainly could use such a service to identify rogue sites serving up child pornography…assuming they don't get caught themselves first.

Governance
An SMS service in Queensland, Australia, is coming under the scrutiny of the government there. "Road Spy" uses SMS messaging to alert motorists to speed traps and random breath test locations. The government would like to see the service shut down. The director of the service claims they are trying to encourage prudent driving via the alerts, while the government claims they are undermining road safety by helping motorists avoid police.

Come on, how can anyone claim that informing motorists of hidden speed checks or random breathalyzer locations could possibly make drivers more prudent? I can just see it now: Someone checks their SMS, presumably hours in advance, and discovers there's a check en-route between their source and destination. Their next step is to conclude they simply won't drink that night…instead of deciding to take an alternative route. Are we to believe the road system in Australia is so abysmal that they don't have alternative routes?

About the Author

Russ Cooper is a senior information security analyst with Verizon Business, Inc. He's also founder and editor of NTBugtraq, www.ntbugtraq.com, one of the industry's most influential mailing lists dedicated to Microsoft security. One of the world's most-recognized security experts, he's often quoted by major media outlets on security issues.

comments powered by Disqus
Most   Popular

Upcoming Training Events

0 AM
Live! 360 Orlando
November 17-22, 2024
TechMentor @ Microsoft HQ
August 11-15, 2025