Forum Moderators: open
An attacker may exploit the vulnerability by sending a specially formed HTTP request to a computer running Microsoft Internet Information Services (IIS). The request may cause the server to fail or to run code of the attacker's choice. The code would run in the security context of the IIS service. (By default, the IIS service runs in the LocalSystem context).
Soooo glad I am not on MS servers!
Now now you Apache folk have security issues as well - just not as many.
Remember, the easier it is to use, the more use friendly it becomes, the more can be broken with it.
It's a trade off for not having to learn Unix and Apache.
We deal with it. Just put the patch on, and pray that the hackers get the big guys first.....
You just have to learn how to use a text editor and deal with not having an "Apply" button.
I find the text file much more intuitive and easy to fine tune compared to the MS Wizzards.
I find the text file much more intuitive and easy to fine tune compared to the MS Wizzards.
ditto
Right. Steep learning curve on Unix/Apache. I never thought I would understand it for the first couple months. (Well, I still don't!) Luckily for me, when I made the jump to my own server, my ISP tech support held my hand for a LONG time. But like anything, you get used to it, and learn it.
I did not mean that som much as a slam on MS (but that was on my mind!) but more in that wasn't there a big virus a couple weeks/ a month ago that attacked MS servers? The last major security patch I remember for FreeBSD was 2-3 years ago, and it was for a telnet problem. Sure there have been upgrades and whatnot since then, but it always seems to happen bigger (and the fall harder) on the IIS systems
An identified security vulnerability in Microsoft® Windows® 2000 could allow an attacker to take control of your computer. This issue is most likely to affect computers used as Web servers. You can help protect your computer from this vulnerability by installing this update from Microsoft.
I couldn't help but wonder how long before MS hosts start to pass along the cost of all these updates?
With regards to this recent problem, all good administrators will not be affected as windows lockdown already protects you server against this vulnerability.
Lets take the issue of applying service packs. No problems I have configured Windows update to automatically do this and all critical service packs get applied without much of a problem.
We currently develop muti-tier systems and are willing to spend the time required to keep the servers safe because as far as we know other Web servers and environments come no way near MS servers and tools.
I know a lot of hardcore Unix people will now flame me but I had to put my 2 cents in.
G,
I was going to add that downloading and installing the service packs takes very little time and effort and the added convenience of ease of operation makes it worth the "trouble".
I've hardly had to reboot my server as well, dispelling an oft quoted myth that Windows servers are unreliable.
While far from perfect, I find the Windows server quite useable and easy to get going and configure.
Would I like to learn nix and Apache? Yes, of course, but I'm in no rush to switch gears at the moment.
I just started writing JSP pages and tried to install Tomcat. The installation was successful but to try to run it through IIS was a nightmare. I asked for help in these forums and was told of other horror stories. So I installed JRUN, a GUI JSP container, and it went up flawlessly and I never had to go back and tweak it since.
IIS has some distinct advantages, especially with .NET. Also, the next version of IIS will have text (actually XML) file configuration, lessening the configuration issues necessary for ISPs.
IIS ISPs already pass on the costs to customers. Compare the prices. Much of that cost passing, though, is because it costs a significant amount of money for Windows 2000 Server, whereas Apache/Linux is free. That cost actually goes down in the next version of windows as they release a Web server specific version.
---
Getting back to the original topic, though--this security flaw could be devestating as unpatched servers all over the web get compromised. What I'd wish they'd tell you in the security bulletins is how to analyze your server logs to tell if you've been attacked/compromised before you could apply the patch.
As a side note, I just discovered that you can have the patches installed automatically on a W2K server just like you can on an XP system on your home computer. I had been using the automated "check for updates" system on MS and installing updates as they came out. But when I tried to do this with the most recent fix, it wouldn't install because the hackers already had control of my machine. They had filled up the hard drive with their crap so there was nowhere to put the update file. Now I see that in the control panel you can have updates downloaded AND installed automatically. Has anyone else used this? If it works properly, I would say the cost of doing patches is now something like -0-!
[slashdot.org...]
Xoc -
>Getting back to the original topic, though--this security >flaw could be devestating as unpatched servers all over?>the web get compromised. What I'd wish they'd tell you in >the security bulletins is how to analyze your server logs >to tell if you've been attacked/compromised before you >could apply the patch.
I always wondered about this. However if we were told exactly how this was done the all the wanna be hackers will be trying there luck on the un-patched servers.
G,