|
BugTraq
Microsoft and Security Jun 25 2004 06:53PM http-equiv@excite.com (1 malware com) (1 replies) Re: Microsoft and Security Jun 26 2004 08:21AM Radoslav DejanoviÄ? (radoslav dejanovic opsus hr) (1 replies) Re: Microsoft and Security Jun 28 2004 12:41PM Justin Wheeler (jwheeler datademons com) (1 replies) RE: Microsoft and Security Jul 04 2004 09:06PM Alun Jones (alun texis com) (3 replies) Re: Microsoft and Security Jul 05 2004 05:58PM Justin Wheeler (jwheeler datademons com) (1 replies) RE: Microsoft and Security Jul 05 2004 11:10PM Alun Jones (alun texis com) (2 replies) Re: Microsoft and Security Jul 09 2004 03:21PM Valdis Kletnieks vt edu (1 replies) Re: Microsoft and Security Jul 12 2004 11:47AM Charles Otstot (charles otstot ncmail net) (1 replies) |
|
Privacy Statement |
| On Mon, 5 Jul 2004, Alun Jones wrote:
|
| > The immediate patch carries maximum risk, and the perfect patch requires
| > unconscionable amounts of time to verify its correctness. Between those two
| > endpoints, however, you'll find a huge variance in what is acceptable risk
| > of damage from a patch versus acceptable delay to test. And unfortunately,
| > neither of those two values is a) measurable, or b) the same for each user.
|
| That's true. However, Microsoft has a much higher record of patches that
| break things than most other vendors. I don't believe that's because
| the people who write the patches are less competent, but I do believe it's
| because they are patching a horribly-designed system.
That's a common perception, but when we looked at vendor patch
updates, as an indicator of patches that have problems, we didn't see
it. And really, we looked. We would have been happy to tweak vendors
for releasing shoddy patches, because bad patches stand out in an
admin's memory, while ok patches cognitively disappear.
Now, it could well be that the problems that cause MS to pull a patch
and replace it are more severe than the ones that cause a Linux vendor
to do so. We didn't examine that, although I'd love to see someone do
that study. What we found was that about 1 patch in 6 gets replaced
at some point, and most of that happens in about 30 days or less.
Adam
Timing the Application of Security Patches for Optimal Uptime
Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, Chris
Wright, and Adam Shostack. Presented at the USENIX 16th Systems
Administration Conference (LISA 2002), Philadelphia, PA, December 2002
http://www.homeport.org/~adam/time-to-patch-usenix-lisa02.pdf
[ reply ]