Researcher Sees Patch Tuesday 'Nightmare'
Corporate security and network administrators face a "nightmare" task trying to figure out what to patch first after Microsoft's biggest-ever Patch Tuesday. "If you're running anything made by Microsoft, you're probably going to be affected...," said one researcher.
By Gregg Keizer
October 13, 2009 — Computerworld —
Corporate security and network administrators face a "nightmare" task just trying to figure out what to patch and what to let slide after Microsoft issued its biggest-ever batch of updates today, researchers argued.
"This is the biggest number of bulletins," said Jason Miller, the security and data team manager for patch management vendor Shavlik Technologies. "It's also the biggest number of individual patches."
The bottom line, said Miller: "This is an administrative nightmare, just trying to get a good grasp of what's out there."
Wolfgang Kandek, the chief technology officer at Qualys, agreed. "This is a huge release," said Kandek. "No one will be untouched."
Today's security updates from Microsoft were unprecedented, with 13 separate bulletins that quashed 34 vulnerabilities. Both were records for the company since it began delivering monthly updates six years ago.
Miller and Kandek noted that several of the security bulletins were extraordinarily complex, which will only complicate the chore of deciding what to patch immediately, and what can wait.
"Just focus on MS09-062 ," said Miller, speaking of the bulletin that patched eight different bugs in the GDI+ (Graphics Device Interface) component within Windows. "The sheer number of products listed as affected is immense."
Microsoft acknowledged that the GDI+ patches affected Windows XP, Vista, Server 2003, Server 2008, Internet Explorer (IE), .NET Framework, all supported editions of Office, SQL Server, Visual Studio and Forefront Client Security.
"GDI touches everything," said Kandek. "And it's a complicated component."
"We're talking about an older technology that's been around for awhile," added Miller, referring to the familiarity hackers have with GDI, and thus the increased likelihood that they will be able to craft exploits for the bugs Microsoft revealed today. "The vulnerabilities affect a lot of different file formats, including Office. If you're running anything made by Microsoft, you're probably going to be affected by this one."
Miller saw two choices for Microsoft's customers: Either postpone patching some of the vulnerabilities or separate the updates into batches that can be rolled out in stages. "This month, they will either have to throw out their normal procedures, or extend their patching cycle by taking them in bunches," said Miller.
Andrew Storms, director of security operations at nCircle Network Security, warned administrators not to do the former. "Despite the number of bulletins and the workload, it's going to be important that companies use the same diligence as always," said Storms. "That's what is going to win the game for everyone."
Given the number of updates that need to be applied, it was no surprise that Miller, Kandek and Storms each had their own recommendations on what patches to roll out pronto.