- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
Computerworld - When Microsoft issued an emergency patch for a critical Windows bug six weeks ago, it warned that attacks were in progress and told users to patch immediately.
The message didn't sink in, a security company claimed today.
Based on scans of between 200,000 and 300,000 Windows PCs owned by its customers, Qualys Inc. concluded that the patching pace for the October update -- which Microsoft released "out-of-cycle," or outside its normal monthly schedule -- was similar to the rate at which users fixed flaws that the company disclosed several weeks later on its usual Patch Tuesday.
"When Microsoft releases a patch out-of-cycle, we tend to think, 'Wow, why are they doing this? There must be a reason,'" said Wolfgang Kandek, Qualys' chief technology officer. "But it doesn't look like people pick up on that."
Over a six-week span, Qualys tallied the machines vulnerable to the MS08-067 vulnerability Microsoft patched off-schedule in October and counted the PCs vulnerable to a pair of patches released on Nov. 11, tagged MS08-068 and MS08-069. "We counted them, and normalized them against the scan numbers," said Kandek.
The result was surprising. "While we saw reductions in the number of [vulnerability] occurrence found every week, they are fairly even and in line with normal patching distributions we have seen before," said Kandek.
Only in the last week or so did Qualys' data show a sudden drop in the number of machines not yet patched with MS08-067.
Kandek had a ready explanation. "We saw it move [down] when Microsoft and Symantec and Trend Micro said last week, 'We found a worm, here it is and it's spreading," he said, referring to the reports this week and last of a worm, dubbed "Conficker.a" by Microsoft and "Downadup" by Symantec, that was aggressively exploiting the MS08-067 vulnerability.
Monday, Trend Micro's researchers said that the worm was a key component in the build-up of a massive botnet, and had already hijacked half a million machines.
So even though Microsoft hit the alarm button for MS08-067, it wasn't until news broke about the Conficker.a worm that users began applying the patch at a higher-than-usual rate, Kandek concluded.
Six weeks after it released the emergency fix, Qualys' data indicated that the number of unpatched PCs had been reduced by about 70 percent. "The number [of unpatched systems] is down, but 70 percent -- that's still bad," said Kandek, considering that Microsoft tagged the update as so critical it departed from its usual schedule, something it had not done since April 2007.
"We [wanted] to see how Microsoft customers apply these patches and if they pay special attention to the highly critical out-of-band vulnerabilities," Kandek said. "Unfortunately, that does not seem to be the case."
MS08-067, which patches a bug in the service Windows uses to connect to file and print servers, can be downloaded via Windows Update, Microsoft's default update service.