Security Watch

Third-Party Microsoft Patch a Bad Idea

Tenuous support, trust, quality and assurance are just some of the reasons not to install a third-party patch.

Hacking
Microsoft Windows Fax and Picture Viewer Buffer Overflow Vulnerability (WMF), Exploit and Spyware Reports: Despite tons of hype about this issue, malcode doesn't seem to have taken off. There has been chatter about the detection rate among the various antivirus vendors, basically discussing whether or not they could actually catch a malicious WMF versus just being able to detect known malware contained within a malicious WMF. It doesn’t really matter, does it, as long as it’s being caught?

Many of you have probably seen suggestions from a variety of sources (other than Microsoft, and other than Cybertrust) that a third-party patch should have been applied prior to Microsoft making its patch available. We told our customers, in no uncertain terms, installing a third-party patch is a bad idea! Let me see if I can explain why.

There’s a difference between some tool that modifies a group of settings to achieve a workaround, and one that is entirely binary and alters the way the operating system (or some application) functions. The first you could do yourself and easily verify. The second must be done by the binary, and there’s no certain way to verify that’s all it does. Now some third parties stepped up and said, “Hey, we checked it as best we could, and it looks fine to us!” Well, that’s great, if they’re the ones you bought your OS from and whom you’ll look to for support if something goes awry.

Don’t get me wrong: I’m not saying anything about the author of such a patch, who may have the best of intentions and incredible skills -- that’s not at issue here.

Worse, though, is that we (as security professionals) are constantly trying to stop the public from installing binaries from “untrusted” sources. How do we determine the difference between malware that comes as a screensaver attachment in e-mail, and the best-intentioned, well-written patch for a security vulnerability? Well, if it’s from Microsoft, it’s signed, and we can verify that we trust the signature. We take it directly from Microsoft’s known download locations, and its support people have a phone number you can call if you have problems. Short of that (or the same thing with any other vendor), we should keep to our best practice of not installing binaries we can’t trust and verify.

We shouldn’t forget about quality and assurance either. Testing of a patch from Microsoft is done extensively for us, prior to its release. Despite the apparent concern over this WMF vulnerability (which, as I believed from the beginning, was dramatically hyped), Microsoft still managed to extensively test the patch prior to its release so we wouldn’t run into problems. Can others make a similar claim?

Want More Security?

This column was originally published in our weekly Security Watch newsletter. To subscribe, click here.

One final note on this subject: Microsoft made a beta of the patch available to some customers as part of that extensive Q&A testing. Someone made that beta patch available to the public. Such a binary should, by reasonable administrators, be treated the same as they would third-party patch. Because despite it being signed by Microsoft, it was not made available from a known and trusted Microsoft download location and Microsoft Support would not be able to provide you with any assistance should it not function properly. Beta software may sound cool, but it’s for testing purposes only, not for production use. It may totally destroy the system it’s installed on or corrupt any number of things. This must be expected from beta software, and a mechanism must exist to provide feedback to the vendor about such software.

What good does it do to, for example, take a copy of the beta patch while not being part of the actual beta and find out it doesn’t work? Since you’ve got no formal arrangement with Microsoft to report bugs in the beta, you instead contact some media outlet. What do you tell them? “Hey, this patch doesn’t work!” Great, now everyone who’s waiting for the final patch thinks it’s broken! Do they know whether or not the problems were quickly resolved in a subsequent beta release? Of course not, how could they? Neither they nor you are part of the beta! Does Microsoft get the needed information about just why the patch is broken? Nope, of course not, they can’t get a dump or know the specifications of the system or even whether or not it was applied correctly.

The bottom line is this: Never let the fear of a security breach cause you to break your security best practices.

About the Author

Russ Cooper is a senior information security analyst with Verizon Business, Inc. He's also founder and editor of NTBugtraq, www.ntbugtraq.com, one of the industry's most influential mailing lists dedicated to Microsoft security. One of the world's most-recognized security experts, he's often quoted by major media outlets on security issues.

comments powered by Disqus
Most   Popular