Windows Hacked in Seconds via Firewire
,----[ Quote ]
| "Yes, it's a feature, not a bug," Boileau stated. "Microsoft knows this. The
| OHCI-1394 spec knows this. People with Firewire ports generally don't."
|
| Microsoft was not immediately available for comment. In the past the company
| has downplayed security problems that require physical access.
`----
http://www.pcworld.com/article/id,143236-c,hackers/article.html
Later on, Microsoft raves about how comparatively insecure Windows' rivals are.
The company lost the ability to feel ashamed of itself or to feel responsible
for its 'customer's' security.
Related:
Microsoft quietly tackles known Wi-Fi flaw
,----[ Quote ]
| Microsoft has quietly posted an update found here. The update
| prevents a Windows wireless client on a laptop from advertising
| its preferred wireless network list to the world at large.
|
| But the update appears to leave open the larger problem, which
| is having your laptop connect to a criminal rogue access point
| with the same default name as one of your preferred home networks.
`----
http://news.com.com/2061-10789_3-6143573.html?part=rss&tag=2547-1_3-0-20&subj=news
Also of relevance:
Vista SP1 will contain undocumented fixes
,----[ Quote ]
| Interesting email in today mailbag: “Will SP1 contain undisclosed or
| undocumented security fixes?”
|
| For some people, counting the number of security flaws that one OS has
| compared to another is important because it offers a metric upon which to
| determine which OS is the most secure (personally, I feel that it’s a bogus
| metric, but I’ll let it slide for now). However, many claim that Microsoft
| stacks the deck in its favor by not disclosing a full list of vulnerabilities
| that have been patched by omitting to include those discovered and patched
| in-house.
`----
http://blogs.zdnet.com/hardware/?p=1225
Critical Vulnerability in Microsoft Metrics
,----[ Quote ]
| This is a small subset of all the vulnerabilities, because the
| vulnerabilities that are found through the QA process and the vulnerabilities
| that are found by the security folks they engage as contractors to perform
| penetration testing are fixed in service packs and major updates. For
| Microsoft this makes sense because these fixes get the benefit of a full test
| pass which is much more robust for a service pack or major release than it is
| for a security update.
`----
http://blog.mozilla.com/security/2007/11/30/critical-vulnerability-in-microsoft-metrics/
http://antitrust.slated.org/www.iowaconsumercase.org/011607/3000/PX03096.pdf
Skeletons in Microsoft’s Patch Day closet
,----[ Quote ]
| This is the first time I’ve seen Microsoft prominently admit to silently
| fixing vulnerabilities in its bulletins — a controversial practice that
| effectively reduces the number of publicly documented bug fixes (for those
| keeping count) and affects patch management/deployment decisions.
`----
http://blogs.zdnet.com/security/?p=316
Beware of undisclosed Microsoft patches
,----[ Quote ]
| Forget for a moment whether Microsoft is throwing off patch counts
| that Microsoft brass use to compare its security record with those
| of its competitors. What do you think of Redmond’s silent patching
| practice?
`----
http://blogs.zdnet.com/microsoft/?p=527
Microsoft is Counting Bugs Again
,----[ Quote ]
| Sorry, but Microsoft's self-evaluating security counting isn't really a
| good accounting.
|
| [...]
|
| The point: Don't count on security flaw counting. The real flaw is
| the counting.
`----
http://www.microsoft-watch.com/content/security/microsoft_is_counting_bugs_again.html?kc=MWRSS02129TX1K0000535
|
|