Feeds

Red Hat holes less severe than Windows - study

Users brace for media app bug hell

  • alert
  • submit to reddit

Build a business case: developing custom apps

Red Hat is making hay from a report on system security vulnerabilities that apparently gives Red Hat Enterprise Linux (RHEL) a clean bill of health.

A SANS Institute report has identified 20 top internet vulnerabilities of which only two affected RHEL, Red Hat said. According to Red Hat, patches have already been issued via the Red Hat network.

Red Hat claimed the report proves RHEL subscribers were less susceptible to network security holes than users of other platforms. The statement, though, is apparently a riposte to studies backed by Microsoft, designed to “prove” Windows is more secure than Linux and offers better performance, that involved RHEL.

A Security Innovation (SI) study published in June and a VeriTest report in April specifically pitted Windows Server 2003 and SQL Sever 2003 against RHEL running MySQL and Oracle 10g, in the SI study, for both security and performance.

Mike Nash, Microsoft's security business and technology unit corporate vice president, recently drew on the SI study to dis' MySQL and Oracle 10g on RHEL, saying: "Unbreakable? I think not," in a reference to Oracle's "Unbreakable Linux" campaign.

Coming back at Microsoft, Red Hat said Wednesday the SANS Institute report showed “relatively few" critical issues affect Linux users. "There are many research reports that try to compare the number of vulnerabilities between Linux and other operating systems, but none take into account the severity of the issues," Red Hat said.

SANS Institute said this quarter's six most critical vulnerabilities affected Internet Explorer (IE), Exchange Server, Windows Message Queuing Server, Windows SMB protocol processing, Windows HTML help file parsing and Windows shell remote code execution.

Away from the Microsoft-Red Hat match, SANS Institute pointed to a "particularly worrisome" trend in vulnerabilities in data back-up products and cited vulnerabilities in Computer Associates' BrightStor ARCServe and Veritas Backup software. "Unfortunately, [storage] products have become easy targets for attackers and since they have access to substantially all data, the products' weakness create real danger," SANS Institute said. [Veritas hooked up with Symantec just in the nick of time, ey? - Ed.]

Home users also face heightened risk of attack, thanks to new holes in iTunes, RealPlayer and IE. RealNetworks' RealPlayer suffered multiple vulnerabilities while iTunes suffered from an MPEG4 file-processing overflow, SANS Institute said.®

Related stories

Longhorn following Unix on security?
Firefox update fixes stability glitches
Worm wears iTunes guise
MS probes Win XP SP2 kernel bug
Warning over unpatched IE bug

Build a business case: developing custom apps

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Microsoft says 'weird things' can happen during Windows Server 2003 migrations
Fix coming for bug that makes Kerberos croak when you run two domain controllers
Cisco says network virtualisation won't pay off everywhere
Another sign of strain in the Borg/VMware relationship?
VVOL update: Are any vendors NOT leaping into bed with VMware?
It's not yet been released but everyone thinks it's the dog's danglies
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.