[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1076462672.22665.11.camel@localhost>
Date: Tue, 10 Feb 2004 19:24:32 -0600
From: Frank Knobbe <frank@...bbe.us>
To: Joe DeMarco <demarcoj@...cast.net>
Cc: bugtraq@...urityfocus.com
Subject: RE: Another Low Blow From Microsoft: MBSA Failure!
On Tue, 2004-02-10 at 13:26, Joe DeMarco wrote:
> Maybe it's just me but, I wouldn't consider a patch successfully
> applied
> until the machine is rebooted. Registry changes usually require this
> process.
I would go even further and question the reliability of just checking
for the presence of Registry keys that claim a patch has been installed.
Anything short of verifying the MD5 hash of a given DLL, driver file or
executable just makes assumptions about a patched version being present
or not. Those assumptions tend you come back to haunt you, and I believe
there are enough people that had exactly that happening. I remember some
patch (a year or so ago) that overwrote a previously patched DLL with a
vulnerable version. Anything checking Registry keys, like Windows Update
I believe, made the assumption that the system was patched when in fact
the defective DLL rendered the system vulnerable.
Any tool, Windows Update, MBSA, or 3rd party should check the actual
files in question, not just logfiles or Registry keys (or anything that
makes historical statements rather than actual statements).
Regards,
Frank
Download attachment "signature.asc" of type "application/pgp-signature" (188 bytes)
Powered by blists - more mailing lists