[13999] in bugtraq

home help back first fref pref prev next nref lref last post

Re: MS signed softwrare privileges

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Thu Feb 24 14:11:16 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <20000224011514.536A541F16@SIGABA.research.att.com>
Date:         Wed, 23 Feb 2000 20:15:09 -0500
Reply-To: smb@RESEARCH.ATT.COM
From: "Steven M. Bellovin" <smb@RESEARCH.ATT.COM>
X-To:         Dax Kelson <Dax@gurulabs.com>
To: BUGTRAQ@SECURITYFOCUS.COM

In message <Pine.GSO.4.20.0002221939500.8993-100000@ultra1.inconnect.com>, Dax
Kelson writes:

> However (playing devil's advocate), you've trusted Microsoft to silently
> execute "any code" on your machine at least once before by installing
> their closed-source operating system, and that is a massive amount of
> unaudited code.

Yes and no.  First, as Juan's original note pointed out, this creates risks
from MS software you didn't install.  Second, and perhaps more important,
anyone who has ever administered a production system knows that you *don't* do
updates, even "harmless" ones, on production systems without testing *in your
environment*, and you *never* do them at critical periods.  The ability for
someone else to update my system is completely unacceptable, even without any
security issues whatsoever.

		--Steve Bellovin

home help back first fref pref prev next nref lref last post