Updated: July 11, 2020 (July 16, 2001)

  Analyst Report

Secure Windows Initiative to Tackle Security Vulnerabilities

My Atlas / Analyst Reports

2,015 wordsTime to read: 11 min
Michael Cherry by
Michael Cherry

Michael analyzed and wrote about Microsoft's operating systems, including the Windows client OS, as well as compliance and governance. Michael... more

A malicious worm program known as Code Red has defaced as many as 225,000 Web sites by exploiting a buffer overflow bug in Internet Information Server (IIS). Microsoft is undertaking an internal reform of its software development and testing practices to combat these kinds of bugs. However, its reform campaign leaves untouched some gaps in its administration tools and management practices that contribute to security risks. Customers can take some steps to protect themselves while waiting to see how effective Microsoft’s reform campaign will be.

The bug exploited by the worm is only the latest in a seemingly constant stream of security bugs that has called into question the enterprise-worthiness of Microsoft’s products. (See “The IIS Indexing Buffer Overflow“.) In June, Microsoft issued bulletins for six security related bugs, and in May it issued seven. Most disturbing was the discovery of multiple buffer overflow bugs that allow attack programs or worms like Code Red to remotely crash or take over Windows servers.

Atlas Members have full access

Get access to this and thousands of other unbiased analyses, roadmaps, decision kits, infographics, reference guides, and more, all included with membership. Comprehensive access to the most in-depth and unbiased expertise for Microsoft enterprise decision-making is waiting.

Membership Options

Already have an account? Login Now