Microsoft Patches VML Vulnerability 130
Uncle Rummy writes, "Microsoft has quietly released an official patch for the zero-day VML vulnerability. The patch was publicly available yesterday, But Microsoft has just added it to the Security Bulletin Index." Eight days from time of first report to patch is pretty fast for Microsoft, and is almost two weeks ahead of their normal patch schedule. This security flaw was being aggressively exploited out in the wild.
this patch was released before patch day? (Score:5, Funny)
Re: (Score:1)
Well just guessing but:
A) These people who write these patches, and the people who work on the DRM and probably not the same.
B) This probably has alot more code that needed to be changed then the DRM fix.
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
What the surprise here is they DID release it early. This has happened only twice before, once with the Windows Meta File (back at the start of the year, http://www.informationweek.com/windows/showArticle
Vendor Reviews... (Score:3, Funny)
Re: (Score:1)
Re:Reviews... (Score:1)
Not a bad turnaround (Score:2, Interesting)
Re:Not a bad turnaround (Score:5, Insightful)
The virus/worm writers are the ones releasing the exploit into the wild the day after patch Tuesday.
That way they are more likely to have it expand for an entire month before MS patches it and messes up their fun.
Security researchers generally want things secure. Virus/Worm writers don't.
Re: (Score:1)
I'm a little surprised they don't unleash their nasties on Monday, before Patch Tuesday. It isn't like Microsoft could make corrections that quickly.
Re: (Score:2)
Disclosing vulnerabilities at the least convenient time for Microsoft accomplishes this - in the long run - by discouraging Microsoft from continuing their inane scheduling. If every security researcher published straight after Patch Tuesday, Microsoft would have no option but to give it up.
Re: (Score:3, Insightful)
equation (Score:1)
virus = a self-replicating computer program written to alter the way a computer operates, without the permission or knowledge of the user.
patch = a small piece of software designed to update or fix problems with a computer program. This includes fixing bugs, replacing graphics and improving the usability or performance.
exploit = a
Firefox not vulnerable because VML not supported? (Score:4, Informative)
W3C's introduction to VML: http://www.w3.org/TR/NOTE-VML [w3.org]
Microsoft's brief introduction to VML: http://msdn.microsoft.com/workshop/author/vml/def
Interestingly, the MS page includes a demo "oval with red background" which doesn't work in my Firefox browser.
Re:Firefox not vulnerable because VML not supporte (Score:3, Insightful)
Re: (Score:1)
Some clarification. (Score:5, Informative)
It isn't a standard, it was a submission to the W3C for consideration, by Microsoft and some of its useful idiots (HP, Macromedia, Autodesk, Visio). Submissions don't automagically get the thumbs up from the W3C. According to Wikipedia, Adobe, Sun and others submitted a proposal for a competing technology called PGML. Best features of the two technologies were then merged and improved upon to produce:
SVG: http://www.w3.org/TR/SVG10/ [w3.org]
SVG became a W3C recommendation on September 4, 2001. Later versions of Opera, Firefox and some other browsers implement at least limited support for SVG. It's also a standard vector graphics creation/exchange format for many open source graphic apps like Inkscape and Scribus. Adobe Illustrator and CorelDraw also support SVG fairly capably. Guess whose browser pointedly doesn't support SVG?
http://en.wikipedia.org/wiki/Vector_Markup_Languag e [wikipedia.org] Check out the code samples. The SVG code is quite a bit more compact than its VML equivalent.
Folks on SVG-rendering browsers (Firefox 1.5.x, Opera 8 and above) will possibly enjoy this little demonstration: http://isthis4real.com/orbit.xml [isthis4real.com]
* * * * *
It's a small world, but I wouldn't want to have to paint it.
—Stephen Wright
Re: (Score:1)
In my work, I created a SVG-based SCADA-like package. I had to build it to run in Adobe's SVG Viewer, because the native Firefox and Opera implementations couldn't run it. Note that I wrote the whole thing with the W3C docs in my hand, not with trial-and-error in the plugin.
The Firefox implementation misses critical things (the viewbox has some problems) and it is very heavy and slow, compared to Adobe's implementation. The Adobe plugin works right in IE, crashes in Firefox under Windows. Firefox in Linux
And even Flash isn't fool-proof. (Score:2)
I think Opera is way ahead of the Mozilla folks on the SVG implementation. That being said, I understand Firefox 2.x will implement SVG 1.1 stuff, like scripting. How well will it implement the new features? Pretty poorly at first, I'm sure. My needs are for basic multimedia implementations, like getting SVG to animate and sync with an audio file. Which is why I'm particularly
Re:Firefox not vulnerable because VML not supporte (Score:1)
Interestingly, the MS page includes a demo "oval with red background" which doesn't work in my Firefox browser.
VML isn't a standard, it was rejected by the W3C.
Given how Firefox ignores things like MNG and SVG, not surprised they didn't implement VML.
Re: (Score:1)
Do you have a link?
Re: (Score:2)
SVG not ignored by Firefox (Score:2, Informative)
HTH
if browserid NOT Equal TO IEXP, mangle.page .. (Score:2)
Interesting enough the page layout is displayed correctly if Firefox changes User Agent ID to Internet Explorer 6. Under default Firefox ID it displays as a drap one page layout. Why does Microsoft mangle its own pages if viewed under a non MS browser.
if ($browserid!=IEXP) { mangle.page(); else display.page(); }
was: Firefox not vulnerable because VML not supported?
Re: (Score:1)
Could this have something to do with... (Score:5, Insightful)
Probably not (Score:5, Insightful)
You might not agree with the policy but that's how it is, and there are reasons for doing it that way. People already whine about patches breaking systems when at present it's an extremely rare occurrence (in all the cases I've encountered, said system was spywared and that was the problem). If they rushed patches out without testing and they ended up breaking things, it could easily get to a state where people refused to patch because they were more scared of the patch than the problem.
We are dealing with non-technical users here, remember. A patch can't include a page of instructions of things you need to check first, nor can it be assumed that if it causes a problem the user can troubleshoot and fix it. It pretty much has to work straight off, and has to do so on literally tens of millions of permutations of software and hardware configurations.
Personally I'd like to see a compromise where they'd release an unofficial, untested patch for power users as soon as they could and the full patch later after testing. However the likely problem would be the unofficial patch would get in the wild, people would tout it as the official MS patch, something would go wrong, and they'd get blamed anyhow.
Re: (Score:2)
that's already the case, even if they HAVE improved in recent years. there's still the stigma associated with patches that seriously broke systems in nt4 and 2k
the only reason i don't worry about patches breaking my (windows) systems is because they're not critical enough to warrant it just let the auto update do its job. my linux servers, on the other hand, get tested thoroughly before
Re: (Score:1)
First, if users install a foreign version of VML.DLL via the Heise patch (I don't know the details of that patch), then they run the risk of flagging their software as "non-genuine" and may lose the ability to get further updates from WindowsUpdate. From Microsoft's point of view, they don't want the headache of dealing with these users who broke the genuineness of their software, so getting a patch out quickly to head it off at the pass is in their best interest.
Second, if the He
Maybe they should have tested it more... (Score:3, Informative)
Re: (Score:3, Funny)
Re: (Score:1)
Microsoft Patches IE Browser Flaw (Score:2, Funny)
Re: (Score:2)
I see by your ID (over 1 million, congrats
Re: (Score:2)
Good for them. (Score:2)
It's kind of funny how the security bulleting reads "Vulnerability in Vector Markup Language Could Allow Remote Code Execution". We're not saying that it does, but we think it's possible.
Gee. Ya think?
Re: (Score:2)
XP SP2 problems (Score:5, Informative)
What a pain in the ass. Is everybody seeing the same trouble?
Re: (Score:2, Interesting)
What's the name of your organization. I'd like to make sure I don't have any of your stock.
Re: (Score:2)
You don't have any stock in us [irs.gov].
Why do we have any left at SP1? I could be flip and say it's because we relied on Tivoli to update them, but I won't go there. Basically, we updated about 100K machines and are hunting down the last few hundred, mostly laptops belonging to people who spend all their time in the field and try to never come into the office where they can be updated. (Among our old-timers, it's a real badge of honor to brag that they haven't been in the office in 6 months.) Internal politics
Re: (Score:2)
We *finally* got a GateKeeper system up and running on our VPN for AV and critical patches. Took an act of the CIO to get the traders to agree to this...
Now please don't audit me
Re: (Score:2)
The other is a little program named M2 that runs at startup, checks a list in a specified directory, compares it to a local server, and applies anything available on the server that applies to your type of machine. You don't start work until it finishes. Works like a charm. Solid as a rock. Cost us nothing because it was written by o
Re: (Score:1, Interesting)
It's NOT! 10/10/2006! (Score:3, Insightful)
Re: (Score:1)
Re: (Score:2, Insightful)
The only trouble I am seeing is why it has taken you so long to put SP2 on [some of] your machines.
Re: (Score:2)
In fact, here is a script that will not only splipstream in SP2, but all critical updates automatically:
http://smithii.com/?q=node/12 [smithii.com]
Re: (Score:1)
also use http://www.driverpacks.net/ [driverpacks.net] to add drivers
Re: (Score:1)
ZERT fix and FAQ entry written too (Score:1)
FAQ document here: http://blogs.securiteam.com/?p=640 [securiteam.com]
Change the icon please (Score:3, Funny)
Fixed last week (Score:1)
Cant install this or a few other patches..help? (Score:2)
Security Update for Windows XP (KB917344)
Cumulative Security Update for Internet Explorer for Windows XP (KB918899)
Security Update for Windows XP (KB925486)
Error codes / "only 8 days" (Score:1)
I can't really help you though.
So, MS takes "only" 8 days to release a patch, and Firefox gets patches out in a day...which seems better: having exploits running around for over a week being hacked at or having it fixed immediately?
Re: (Score:1)
If only... (Score:2)
microsoft too late again? (Score:1)
Quietly? (Score:2, Insightful)
Re: (Score:1)
I haven't seen an email notification from Microsoft for this patch yet, and it still hasn't been listed in their Security Bulletin Index (and when I submitted the article, it said as much - for some bizarro reason kdawson decided to change it to the innacurate text stating th
VML's real name (Score:2)
VML Patched by Microsoft! (Score:1)
A security issue has been identified in the way Vector Markup Language (VML) is handled that could allow an attacker to compromise a computer running Microsoft Windows and gain control over it.
You can help protect your computer by installing this update from Microsoft.
After you install this item, you may have to restart your computer.
Check Windowsupdate [blogspot.com]
Re: (Score:1)
Let check it out.. (Score:1)
Re: (Score:1)
why this affect IE? (Score:1)
patch.. (Score:1)
Faster than a speeding bullet: Microsoft patches V (Score:1)
Re: (Score:2, Informative)
Re: (Score:2, Insightful)
Re: (Score:1)
Reference please?
Re: (Score:1)
Re: (Score:2)
I've looked @ the nonadmin site (yours????) before and I don't see the dll security setting you reference (to neuter IE).
Would you mind spoon feeding me?
Thanks,
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Actually, the Administrator is a highly priveleged account but it doesn't have unlimited access (e.g. cannot get into the SAM part of the registry). The account with the most privileges (and the closest equivalent to root on UNX/Linux) is the NTAuthority/System account. Keep this in mind when checking which account services are running under. Think about e.g. your web server running with more access to the system than e
Re: (Score:1)
Re: (Score:2)
Re: (Score:2, Interesting)
Which is part of the window manager which according to this image from microsoft.com [microsoft.com] has been run in kernel mode since NT 4.0 (Article ref [microsoft.com]). If that weren't the case, then Explorer could not hang the window manager (which it sometimes does).
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
I think Microsoft is partly to blame for this misconception - the way they claimed in their anti-trust case that IE was part of the OS wasn't exactly helpful. (However, note that all the libraries that Konqueror uses that if removed affect other parts of KDE are in a completely separate package - kdelibs - and have
Re: (Score:2)
Wow, ur so kewl 2! You can point out when someone is making an obvious point, but then completely blow it when you refer to running windows as if the OP had commented on it being a Windows-only vulnerability... when the OP only referred to other browsers, not other OSs.
Flame on, if you like, but having something more useful or amusing to add
Re: (Score:2)
Re: (Score:1)
It's like a when your Commodore 64 locked up, and it keept making that same horrible floppy drive noise over and over and over again..
the first rule of slashdot (Score:2)
if you don't have a girlfriend, mention that you used to have an 8-bit computer
Re: (Score:1)
I'd be willing to bet that Mac OS X/Linux users would have a lot more security problems if we used "SoftwareUpdate.app" (in the case of OS X) or "sudo apt-get" (in the case of Linux) as our default web browser.
Thankfully, only Microsoft has been daft enough to use a single piece of software to both browse the web and tinker w/ the core of the operating system.
Until somebody in Redmond decides to develop a standalone app for system updates and limits IE to being a web browser ONLY, Windows users will
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Compare to...any other OS: they tell you right off the bat "hey, you probably don't want to run as administrator. Here, let me make you a limited account that you should use to access your compu
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)