Actually, it is pretty standard practice for a vendor to NOT put out a bug
notification until they are sure they have a good fix.  This happened with
one of the bugs I found in HP-UX.  HP didn't put a notice out until they had
a patch available.  

I have observed that vendors, HP included, tend to take a rather defensive
approach to dealing with bugs in their software.  Unfortunately this is
counter productive when you are trying to get a serious security flaw
patched.
In general I think Microsoft does a pretty good job of getting patches out
but they have missed the boat on serveral occassions and this is certainly
one of them.     


> How many freakin' days does it take to provide even a temporary workaround
> (which eEye provided themselves) that, for example, limits the URL length
> to 255 chars?  MS has the source--just add in this check, release the
> temporary fix, continue working on the permanent fix--saving hundreds of
> thousands of servers from being exploited in the meantime.
> 
> Oh, food for thought:  If MS is now so security conscious, why does their
> *web server* _still_ run as SYSTEM...  This is security 101 and I give
> them an F.  The flaw in IIS would have not been as devastating (run any
> code you want _as SYSTEM_ on the remote host...)
> 
> -Jason
> 
> AT&T Wireless Services
> IT Security
> UNIX Security Operations Specialist
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to