{"id":16462,"date":"2019-09-30T10:30:04","date_gmt":"2019-09-30T18:30:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/09\/30\/news-10202\/"},"modified":"2019-09-30T10:30:04","modified_gmt":"2019-09-30T18:30:04","slug":"news-10202","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/09\/30\/news-10202\/","title":{"rendered":"Microsoft Patch Alert: Botched IE zero-day patch leaves cognoscenti fuming"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security14-100734743-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Mon, 30 Sep 2019 10:16:00 -0700<\/strong><\/p>\n<p>So you think Windows 10 patching is getting better? Not if this month\u2019s Keystone Kops reenactment is an indicator.<\/p>\n<p>In a fervent frenzy, well-meaning but ill-informed bloggers, international news outlets, even little TV stations, enjoyed a hearty round of \u201cThe Windows sky is falling!\u201d right after the local weather. It wasn\u2019t. It isn\u2019t \u2013 no matter what you may have read or heard.<\/p>\n<p>Microsoft has a special way of telling folks how important its patches might be. Every individual security hole, listed by its <a href=\"https:\/\/cve.mitre.org\/cve\/\" rel=\"noopener nofollow\" target=\"_blank\">CVE number<\/a>, has an \u201cExploitability Assessment\u201d consisting of:<\/p>\n<p>There is also an indicator of <a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/exploitability-index\" rel=\"noopener nofollow\" target=\"_blank\">how \u201clikely\u201d<\/a> it is for a given hole to become a problem with the current software release and\/or older versions.<\/p>\n<p>It probably won\u2019t surprise you to know that the definitions of the terms are fluid, inexact, and very hard to nail down.<\/p>\n<p>Security people tend to get excited when they see an \u201cExploited: Yes\u201d entry for a newly publicized security hole: Obviously, that particular bug needs to be fixed quickly because it\u2019s out there on the loose.<\/p>\n<p>Except that isn\u2019t always the case, and it\u2019s becoming less and less pressing as time goes on. Why? Because most of the \u201cExploited: Yes\u201d zero-days are directed at a very, very narrow target population. Governments attacking governments. Big, shadowy criminal enterprises spearing high-profile targets. If you\u2019re protecting state secrets or billion-dollar projects, sure, you need to watch out for the zero-days, and right away. If you\u2019re a normal user, normal business, normal organization \u2013 not so much.<\/p>\n<p>We saw that ambivalence in action this month. When Patch Tuesday arrived on Sept. 10, Microsoft listed two separate security holes as \u201cExploited: Yes\u201d \u2013 the holes identified as <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1214\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2019-1214<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1215\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2019-1215<\/a>. Security folks were tripping over themselves insisting that normal users needed to get both of those patches applied right away.<\/p>\n<p>And then, without announcement or fanfare, sometime late on Sept 11 or early Sept. 12, Microsoft simply <a href=\"https:\/\/www.askwoody.com\/2019\/microsoft-says-the-two-exploited-security-holes-in-the-september-patches-arent-actually-exploited\/\" rel=\"noopener nofollow\" target=\"_blank\">switched those two patches<\/a> from \u201cExploited: Yes\u201d to \u201cExploited: No.\u201d Few people noticed. The red flags had been thrown, the whistle blown, and those two patches remained Patching Public Enemy Nos. 1 and 2.<\/p>\n<p>That brings me to this month\u2019s <a href=\"https:\/\/www.computerworld.com\/article\/3440523\/what-do-we-know-about-the-big-scary-exploited-emergency-patched-ie-security-hole-cve-2019-1367.html\">big, scary, exploited, emergency-patched IE security hole CVE-2019-1367<\/a>. In what may be the worst rollout in modern Windows patching history, Microsoft rolled all over itself.<\/p>\n<p><strong>Sept. 23:<\/strong> Microsoft released the CVE-2019-1367 bulletin, and published Win10 cumulative updates in the Microsoft Catalog for versions 1903, 1809, 1803, 1709, 1703, Server 2019 and Server 2016. It also released an IE rollup for Win7, 8.1, Server 2012 and Server 2012 R2. Those were only available by manual download from the Catalog \u2013 they didn\u2019t go out through Windows Update, or through the Update Server. Admins in charge of networks were going crazy because this \u201cExploited: Yes\u201d patch was out, but not in a form that they could readily push to all of their machines.<\/p>\n<p><strong>Sept. 24:<\/strong> Microsoft released <a href=\"https:\/\/www.computerworld.com\/article\/3440741\/microsoft-releases-emergency-ie-patches-inside-optional-non-security-cumulative-updates.html\">\u201coptional, non-security\u201d cumulative updates<\/a> for Win10 version 1809, 1803, 1709, 1703, 1607\/Server 2016. Nothing for Win10 version 1903. We also got Monthly Rollup Previews for Win7 and 8.1. Microsoft didn\u2019t bother to mention it, but we found that those Previews include the IE zero-day patch as well. This bunch of patches went out through normal channels \u2013 Windows Update, Update Server \u2013 but they\u2019re \u201coptional\u201d and \u201cPreview,\u201d which means most savvy individuals and companies won\u2019t install them until they\u2019ve been tested.<\/p>\n<p><strong>Sept. 25:<\/strong> Microsoft \u201c<a href=\"https:\/\/www.askwoody.com\/2019\/microsoft-clarifies-its-cve-2019-1367-release-method\/\" rel=\"noopener nofollow\" target=\"_blank\">clarified<\/a>\u201d its badly botched patching strategy:<\/p>\n<p>Starting September 24, 2019, mitigation for this vulnerability is included as part of the 9C optional update, via Windows Update (WU) and Microsoft Update Catalog, for all supported versions of Windows 10, with the exception of Windows 10, version 1903 and Windows 10, version 1507 (LTSB).<\/p>\n<p>It makes me wonder who was minding the store last week.<\/p>\n<p><strong>Sept. 26:<\/strong> Microsoft releases the \u201coptional, non-security\u201d patch for Win10 version 1903. It apparently includes the fix for this IE zero-day.<\/p>\n<p><strong>Sept. 30<\/strong>: As of early morning, Microsoft hasn\u2019t provided additional details about the security hole or the patch. If there are exploits in the wild, I don\u2019t know anyone who\u2019s seen them. We also don\u2019t know whether exploiting the security hole requires IE, or whether it can somehow be triggered without using the browser. The situation\u2019s so absurd that Patch Lady Susan Bradley says (<a href=\"https:\/\/www.askwoody.com\/newsletter\/heres-why-were-not-patching-internet-explorer\/\" rel=\"noopener nofollow\" target=\"_blank\">paywalled<\/a>):<\/p>\n<p>At this time, the IE exploits appear to be highly targeted and narrowly applied. But the company hasn&#8217;t clearly spelled out the extent of the threat \u2014 except indirectly by making the fix relatively difficult to get. So in what might be a first \u2014 and with some concern \u2014 I&#8217;m recommending skipping the still-optional zero-day IE patches, both the standalone updates and in the preview cumulative updates. I believe it&#8217;s safer to wait and ensure that the possible side effects are fully investigated.<\/p>\n<p>We have <a href=\"https:\/\/www.askwoody.com\/2019\/three-known-bugs-in-the-latest-build-of-win10-version-1903\/\" rel=\"noopener nofollow\" target=\"_blank\">three reported bugs<\/a> in the latest IE patches.<\/p>\n<p>While September\u2019s most spectacular patching failure incorporates innovative new screw-ups, there are plenty of mundane problems as well:<\/p>\n<p>There <em>is<\/em> a bit of good news: In spite of <a href=\"https:\/\/www.computerworld.com\/article\/3436857\/heads-up-a-free-working-exploit-for-bluekeep-just-hit.html\">initial reports<\/a> that a working exploit of the BlueKeep vulnerability has hit the fan, there still aren\u2019t any signs of an imminent major infection. We could use a little good news, eh?<\/p>\n<p>Still and all, Win10 patching \u2013 Windows patching in general \u2013 isn\u2019t getting better. Of this I\u2019m sure.<\/p>\n<p><em>Join us for free help and commiseration <\/em><a href=\"https:\/\/www.askwoody.com\/2019\/where-we-stand-with-the-september-2019-patches\/\" rel=\"noopener nofollow\" target=\"_blank\"><em>on AskWoody.com<\/em><\/a><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-patch-alert-botched-ie-zero-day-patch-leaves-cognoscenti-fuming.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security14-100734743-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Mon, 30 Sep 2019 10:16:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>So you think Windows 10 patching is getting better? Not if this month\u2019s Keystone Kops reenactment is an indicator.<\/p>\n<p>In a fervent frenzy, well-meaning but ill-informed bloggers, international news outlets, even little TV stations, enjoyed a hearty round of \u201cThe Windows sky is falling!\u201d right after the local weather. It wasn\u2019t. It isn\u2019t \u2013 no matter what you may have read or heard.<\/p>\n<h2><strong>The fickle finger of zero-day fate<\/strong><\/h2>\n<p>Microsoft has a special way of telling folks how important its patches might be. Every individual security hole, listed by its <a href=\"https:\/\/cve.mitre.org\/cve\/\" rel=\"noopener nofollow\" target=\"_blank\">CVE number<\/a>, has an \u201cExploitability Assessment\u201d consisting of:<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3216425\/microsoft-patch-alert-botched-ie-zero-day-patch-leaves-cognoscenti-fuming.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,10909,13764,714,10525],"class_list":["post-16462","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-microsoft-office","tag-pcs","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16462","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16462"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16462\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16462"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}