Enterprise IT administrators, bombarded by daily software vulnerability warnings on a daily basis, have not been serious about applying security patches despite the clear danger of worms, viruses and intruder attacks.
That’s the word from online security experts who estimate that up to 50 percent of all enterprises could be sitting ducks for hacker attacks because of unpatched, vulnerable computer systems.
While it is impossible to figure exact percentages of critical or important patches that have been downloaded and installed, experts believe the application of fixes are delayed for months, even with the increased awareness after the recent Code Red and Slammer incidents.
Last year alone, network administrators had to deal with more than 80 percent more vulnerabilities than in 2001, according to a report from Symantec (Quote, Company Info), which provides anti-virus software. Microsoft (Quote, Company Info), the world’s leading software vendor, issued 72 security alerts in 2002 and 10 already this year.
A Microsoft spokesman told internetnews.com there are no exact percentages available for issued patches and downloaded because there is not a 1:1 ratio of patch downloads to patch applications.
“While technologies such as Windows Update, Auto Update and SUS have increased patch uptake, we cannot provide detailed download statistics. Large enterprises often download a patch to a local server, then deploy it across thousands of computers, therefore; patch downloads are not indicative of the numbers of computers protected,” the spokesman explained.
Marty Lindner, team leader for incident handling at the CERT Coordination Center, agreed it was nearly impossible to figure out actual percentages. In large enterprises, for instance, Lindner said the term ‘patch download’ doesn’t apply because those systems are typically protected through an outsourced software maintenance contract.
“In a major organization, if they have 100,000 machines, they aren’t downloading and installing 100,000 patches. It really is hard to measure because, even for smaller business, you have no way of knowing what happens once a patch is downloaded. You don’t know how many machines it is applied to and who is sharing a patch with who,” Lindner explained.
Lindner’s CERT/CC, the federally funded clearinghouse for warnings from all major vendors, reported 4,129 vulnerabilities in 2002, almost double the number issued the previous year. The Center’s statistics show an alarming trend upwards but Lindner said the lack of information is still a major setback in the Center’s quest to secure susceptible systems.
Lindner blamed the administrators’ indifference to patch applications on the large amounts of security information being shuttled to enterprises on a daily basis. “The sheer volume of security information that’s seen by a network administrator is mind-boggling. In many cases, it’s a huge task just figuring out which patch applies to you,” he explained.
Even after the sysadmin is made aware of the problem, it’s not a straightforward care of applying a patch, Lindner explained. “People believe you solve the problem by applying a patch but, typically, you can do a configurating change or turn off the offending software and secure your system,” he added.
“The first challenge is to decide which patches apply to your system. After you have weeded through that, then you have to apply the patch and test it outside of production. When you apply the patch, you have to make the blind assumption that it’s fixing whatever needs to be fixed. Even then, you take the risk that you will break something that used to work,” Lindner said in an interview, arguing that faulty patches have been just as destructive as the vulnerable software it was meant to fix.
Thomas Kristensen, chief technology officer as security research firm Secunia, believes network admins are more likely to patch holes in mail servers and Web servers in a timely manner.
“Generally, in a medium-sized business, they’ll use Windows update and get patches relevant to their systems and, even then, they’ll apply the patches based on whether it is important or not,” Kristensen said.
He said bug warnings around Web browsers or other client systems are routinely ignored because they are deemed unimportant. “Sometimes, they will hesitate and delay fixing a faulty browser for several months and assume they aren’t vulnerable because they’re using a firewall but that is a dangerous assumption. The intruders are sophisticated and are using attack scenarios that penetrate the firewall,” Kristensen told internetnews.com.
In many small- and medium-sized enterprises, Kristensen said it boiled down to a matter of available resources to deal with patch applications. “They just don’t have the tools or software to distribute patches in the network. They’ll have to do it individually and it is a tremendous task for a one-man staff to be running from machine to machine to plug a hole,” he said.
CERT/CC’s Lindner agreed that the urgency to apply fixes was determined by the cost factor. “Many corporations choose to measure the risk associated with the cost of patching a system. Sometimes, it is a conscious decision that patching computer systems is not a high enough priority to spend big dollars to do it,” Lindner asserted.
So what to do when all of those patches are critical? Read more on Page 2.