Computerworld - Microsoft late last week said it won't patch Windows XP for a pair of bugs it quashed Sept. 8 in Vista, Windows Server 2003 and Windows Server 2008.
The news adds Windows XP Service Pack 2 (SP2) and SP3 to the no-patch list that previously included only Windows 2000 Server SP4.
"We're talking about code that is 12 to 15 years old in its origin, so backporting that level of code is essentially not feasible," said security program manager Adrian Stone during Microsoft's monthly post-patch Webcast, referring to Windows 2000 and XP.
"An update for Windows XP will not be made available," Stone and fellow program manager Jerry Bryant said during the Q&A portion of the Webcast (transcript here).
Last Tuesday, Microsoft said that it wasn't patching Windows 2000 because creating a fix was "infeasible."
The bugs in question are in Windows' implementation of TCP/IP, the Web's default suite of connection protocols. All three of the vulnerabilities highlighted in the MS09-048 update were patched in Vista and Server 2008. Only two of the trio affect Windows Server 2000 and Windows XP, Microsoft said in the accompanying advisory, which was refreshed on Thursday.
In the revised advisory, Microsoft explained why it won't patch Windows XP, the world's most popular operating system. "By default, Windows XP SP2, Windows XP SP3 and Windows XP Professional x64 Edition SP2 do not have a listening service configured in the client firewall and are therefore not affected by this vulnerability," the company said. "Windows XP SP2 and later operating systems include a stateful host firewall that provides protection for computers against incoming traffic from the Internet or from neighboring network devices on a private network."
Although the two bugs can be exploited on Windows 2000 and XP, Microsoft downplayed their impact. "A system would become unresponsive due to memory consumption ... [but] a successful attack requires a sustained flood of specially crafted TCP packets, and the system will recover once the flood ceases."
Microsoft rated the vulnerabilities on Windows 2000 and XP as "important" on Windows 2000, and as "low" on XP. The company uses a four-step scoring system, where "low" is the least-dangerous threat, followed in ascending order by "moderate," "important" and "critical."
The same two bugs were ranked "moderate" for Vista and Server 2008, while a third -- which doesn't affect the older operating systems -- was rated "critical."
During the Q&A, however, Windows users repeatedly asked Microsoft's security team to explain why it wasn't patching XP, or if, in certain scenarios, their machines might be at risk. "We still use Windows XP and we do not use Windows Firewall," read one of the user questions. "We use a third-party vendor firewall product. Even assuming that we use the Windows Firewall, if there are services listening, such as remote desktop, wouldn't then Windows XP be vulnerable to this?"
"Servers are a more likely target for this attack, and your firewall should provide additional protections against external exploits," replied Stone and Bryant.
Another user asked them to spell out the conditions under which Microsoft won't offer up patches for still-supported operating systems. Windows Server 2000 SP4, for example, is to receive security updates until July 2010; Windows XP's support doesn't expire until April 2014.
Stone's and Bryant's answer: "We will continue to provide updates for Windows 2000 while it is in support unless it is not technically feasible to do so."
Skipping patches is very unusual for Microsoft. According to a Stone and Bryant, the last time it declined to patch a vulnerability in a support edition of Windows was in March 2003, when it said it wouldn't fix a bug in Windows NT 4.0. Then, it explained the omission with language very similar to what it used when it said it wouldn't update Windows 2000.
"Due to these fundamental differences between Windows NT 4.0 and Windows 2000 and its successors, it is infeasible to rebuild the software for Windows NT 4.0 to eliminate the vulnerability," Microsoft said at the time.
分享到:
相关推荐
lwIP has grown into an excellent TCP/IP stack for embedded devices, and developers using the stack often submit bug fixes, improvements, and additions to the stack to further increase its usefulness. ...
RELEASE NOTES FOR MICROSOFT(R) TCP/IP-32 FOR WINDOWS(TM) FOR WORKGROUPS 3.11 PLEASE READ THIS ENTIRE DOCUMENT General ------- This product is compatible with, and supported exclusively on, the ...
how to submit bug reports, patches, or suggestions for improvement, see the Apache Commons FileUpload website: http://commons.apache.org/proper/commons-fileupload/ Have fun! Benedikt Ritter, on ...
Allen Bauer from Borland has released three unofficial patches that greatly improves the stability of the Delphi 2005 IDE with replacement memory managers (like FastMM). (One of these patches replaces...
DNN module patches: Improved layers / supported more models: Scatter and ScatterND #22529, Tile #22809 Fixes in Slice (support negative step #22898) Support some reduce layers of ONNX #21601 ...
This examples will break in future as websites change and dependencies are updated, so [bug reports and patches](https://bitbucket.org/wswp/code/issues?status=new&status=open) are welcome.
用法:cd / where / aosp / sources bash〜/ files / patches / aosp / v224 / apply-patches.sh〜/ files / patches / aosp / v224 / buildCaos.sh用于从零开始启动构建过程。 用法:cd〜/ files / patches / ...
Feel free to clone from this URL and submit patches for consideration for inclusion in future versions. You can also issue pull requests for changes that you've made and would like to share. * ...
Feel free to clone from this URL and submit patches for consideration for inclusion in future versions. You can also issue pull requests for changes that you've made and would like to share. * ...
You may donate any amount to support DSK Music project by clicking the PayPal button in my site (you don抰 need a PayPal account to donate) or directly to my paypal acount: dskmusic@live.com ...
- `show_patches` #### 7. 系统语言环境管理 - **用途**:管理和查询系统语言环境。 - **示例**: - 查看已安装的语言环境:`locale -a` - 显示当前环境变量:`echo $LANG` - 设置语言环境:`export LANG=zh_...
On Linux, you can tell cmake to build Makefiles for icpc directly. This requires you to have configured Intel's compiler environment (by sourcing the appropriate shell script). For example: $ source ...
python3 generate_patches_SIDD.py --src_dir /home/dell/桌面/TPAMI2022/Dehazing/#dataset/NH_haze/train --tar_dir /home/dell/桌面/2022毕业设计/Datasets/NH-HAZE/train_patches 训练代码My_train.py python3 ...
python3 generate_patches_SIDD.py --src_dir /home/dell/桌面/TPAMI2022/Dehazing/#dataset/NH_haze/train --tar_dir /home/dell/桌面/2022毕业设计/Datasets/NH-HAZE/train_patches 2.2 训练代码My_train.py ...
使用的数据是32 patches、306 vertices版本。特别注意:原数据中patches对应的顶点的索引是从0到306的。如果vertices数据是保存在某数组中,则patches中的数据需要“整体减1”后才能和vertices数组正确对应。 测试...
1、资源描述:钢材表面缺陷数据集,共有1800张图片,包含六种类型:crazing、inclusion、patches、pitted_surface、rolled-in_scale、scratches 2、资源内容:参数化编程、参数可方便更改、代码编程思路清晰、注释...
用于linux下安装RabbitMQ ,首先安装Erlang环境...Erlang 25.1(下载 地址:https://www.erlang.org/patches/otp-23.2.7.5) rabbitmq (下载地址:https://github.com/rabbitmq/rabbitmq-server/releases/tag/v3.10.25)
Patches for Envi 5.1 + Envi Lidar 5.1 好用,破解方便
commons-pool-1.5.4 RELEASE NOTES This is a patch release containing a fix for POOL-152, a ...patches, or suggestions for improvement, see the commons-pool website: http://commons.apache.org/pool/