First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Microsoft explains seven-year-old patch delay
- — 14 November, 2008 10:18
Microsoft Tuesday explained why it had been unable to patch a seven-year-old bug until recently, saying that it was only in the last year that it figured out how to fix the flaw without breaking most network-based applications.
The bug in Microsoft's SMB (Server Message Block) protocol, which is used by Windows to share files and printers over a network, was patched Tuesday as part of the company's normal monthly security updates. What stood out, however, wasn't the fix as much as the time it took Microsoft to come up with a patch.
In a post to the Microsoft Security Response Center (MSRC) blog, MSRC spokesman Christopher Budd acknowledged the seven-year stretch between the time when the vulnerability was first discussed and the patch. Then he launched into an explanation.
"When this issue was first raised back in 2001, we said that we could not make changes to address this issue without negatively impacting network-based applications," Budd said. "And to be clear, the impact would have been to render many, or nearly all, customers' network-based applications then inoperable."
Rather than break applications, Microsoft passed on a patch, and instead told companies they could protect themselves by using SMB signing, though that, too, wasn't a panacea. "The reality was that there were similar constraints that made it infeasible for customers to implement SMB signing," Budd admitted.
In the meantime, SMB relay attacks, the term given to the original proof-of-concept crafted in 2001 by a hacker using the alias "Sir Dystic," were feasible if not actually in-the-wild.
But Microsoft didn't drop the matter, Budd said. "Over the course of the past year, however, ongoing work showed us a way to ... address the issues outlined in the SMBRelay attack and also minimize the impact on network applications," he said. The result: Tuesday's patch.
The explanation rang true to Eric Schultze, the chief technology officer at Shavlik Technologies, a security company. Schultze, who once worked for Microsoft and the MSRC, said he had been the one to bring the SMB relay attack to the attention of the company.
"I think it does make sense," said Schultze, referring to Budd's reasoning. "I pushed hard for a fix to this in 2001, and we ended up having a meeting with the OS and IE teams. At first we thought it was mitigated in IE, but that only worked for non-OS calls to SMB. This was actually different. That took a while for everyone to understand."