Was Microsoft’s WMF Exploit response fast enough?
Become a Patron of Ask Leo! and go ad-free!
I’m sure you’re tired of hearing it, so I’ll only say it once: if you haven’t installed the official Microsoft patch for the WMF Exploit, go do it now. I’ve got links in the show notes.
The sequence of events surrounding the WMF exploit is actually pretty interesting. A big bad bug is found and publicized, and while Microsoft is testing their official fix for the problem, several rogue patches are released, the tech press even starts to recommend that those rogue patches be used, and finally the mainstream press starts to apply pressure for it to be released as soon as possible. After about a week or so of public vulnerability, Microsoft engages and does exactly that, releasing the WMF patch roughly four days ahead of schedule.
Should it have been released even earlier?
There’s a huge risk when a situation becomes so serious that unofficial patches and workarounds become recommended solutions. In this case I’ve not heard of any problems, but the opportunity for error, or even maliciousness, is huge. Getting the official fix for such a public, high profile error, has to happen quickly.
Now I know some people consider me a Microsoft apologist because I worked there for many years, but I really do understand Microsoft’s side of the situation as well. Windows is an incredibly complex piece of software, and the test matrix – the sequence of scenarios, applications and hardware configurations that changes must be tested against – is massive. More massive, I expect, than most people realize. And the cost of “getting it wrong” can be very high. A high priority fix produced and released under high visibility at high speed can’t be allowed to meet anything other than the highest quality bar. And yes, there is a release process – a bureaucracy even – in place to make sure that happens.
But is it fast enough?
It might be time for Microsoft to get creative. Perhaps, by releasing a provisionally approved patch when the situation is serious enough. Yes, that might require fixing the fix, should problems become evident and the possibility of handling that would have to be part of the plan.
It boils down to some serious risk analysis on Microsoft’s part. Is it better to allow a known exploit to remain in the wild, where it, or rogue patches potentially damage customers machines, or would it be better to -release a not-quite-fully-cooked solution quickly that could be further updated as needs warrant?
I know what I, as a user, would vote for.
I’d love to hear what you think. Visit askleo.info, and enter 9679 in the go to article number box. Leave a comment, I read them all. And while you’re there: sign up for my free weekly newsletter.
This is a presentation of askleo.info, a free on-line technical question and answer service. Hundreds of questions and answers are online and ready to help solve your computer problems.