lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1076462672.22665.11.camel@localhost>
Date: Tue, 10 Feb 2004 19:24:32 -0600
From: Frank Knobbe <frank@...bbe.us>
To: Joe DeMarco <demarcoj@...cast.net>
Cc: bugtraq@...urityfocus.com
Subject: RE: Another Low Blow From Microsoft: MBSA Failure!

On Tue, 2004-02-10 at 13:26, Joe DeMarco wrote:
> Maybe it's just me but, I wouldn't consider a patch successfully
> applied
> until the machine is rebooted. Registry changes usually require this
> process.

I would go even further and question the reliability of just checking
for the presence of Registry keys that claim a patch has been installed.
Anything short of verifying the MD5 hash of a given DLL, driver file or
executable just makes assumptions about a patched version being present
or not. Those assumptions tend you come back to haunt you, and I believe
there are enough people that had exactly that happening. I remember some
patch (a year or so ago) that overwrote a previously patched DLL with a
vulnerable version. Anything checking Registry keys, like Windows Update
I believe, made the assumption that the system was patched when in fact
the defective DLL rendered the system vulnerable.

Any tool, Windows Update, MBSA, or 3rd party should check the actual
files in question, not just logfiles or Registry keys (or anything that
makes historical statements rather than actual statements).

Regards,
Frank




Download attachment "signature.asc" of type "application/pgp-signature" (188 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ