In-Depth

Vista Has Fewest Vulnerabilities at 6-Month Mark

Microsoft claims that Windows Vista has proven exceptionally secure so far.

Windows Vista, in its first half-year of life, has proven to be an exceptionally secure operating system — much more secure, in fact, than competing desktop OSes, according to Microsoft.

A "6 month vulnerability report" released Thursday by Microsoft shows that, compared to the first six months following the release of Windows XP, OSes from various Linux distributions, and even Mac OS X 10.4, that Vista is the hands-down winner for fewest security holes.

The report was written by Jeff Jones, a Security Strategy Director in Microsoft's Trustworthy Computing group. He noted that for Vista's first six months (it was released to business Nov. 30, 2006), a total of 12 vulnerabilities affected Vista. Microsoft rated five of those vulnerabilities "Critical," six as "Important," and one did not have a severity rating.

Another organization, The National Institute of Standards (NIST) in the National Vulnerability Database (NVD), had a slightly different rating of the flaws. It rated 10 of the issues as High severity, one as Medium and one as Low.

Jones compared those figures with the vulnerabilities in the first six months for the following OSes: Windows XP, Red Hat Enterprise Linux 4 WS, Ubuntu 6.06 LTS Desktop, Novell SUSE Linux Enterprise Desktop 10 and Mac OS X 10.4 (Tiger). Jones said he picked those particular Linux distributions because they were either very popular (Red Hat and Novell), or an up-and-comer (Ubuntu, which Dell ships as the default distro on its Linux-based computers).

Windows XP, which shipped on Oct. 25, 2001, had 36 vulnerabilities fixed in the first six months, including 23 that the NIST rated as High severity. Thus, XP had three times the number of security holes as Vista.

But XP still fared much better than the Linux OSes. Jones compared Vista to two different types of each Linux distribution: a full install with all components, and a "stripped-down" version with only those components that make it comparable to Vista functionality. Linux, unlike Microsoft desktop OSes, allow piecemeal installation of components.

During the first six months following the release of Red Hat Enterprise Linux 4 WS, Red Hat fixed 214 vulnerabilities in the "reduced" version Jones used for comparison, including 62 that the NIST rated as High severity.

Novell's SUSE Linux Enterprise Desktop 10 fared better, with 123 flaws in the reduced functionality version fixed by Novell, including 44 rated as High severity by the NIST.

Ubuntu Linux came in squarely in the middle of the Linux group. "During the first 6 months, Ubuntu fixed 145 vulnerabilities affecting Ubuntu 6.06 LTS. 47 of those fixed were rated High severity in the NVD," Jones noted.

Even Apple, which makes a big show of its security superiority over Windows, fared worse, according to Jones' statistics. He reported that with the first six months of its release, Mac OS X had 60 holes fixed, 18 of which the NIST rated as High severity.

Jones' conclusion after looking at the data? "In all four cases studied for the 6 month period after ship, Windows Vista appears to have a lower vulnerability fix and disclosure rate than the other products analyzed, including the reduced Linux installations. This affirms the early results that we found after 90 days and provides a supporting indicator that the Microsoft Security Development Lifecycle process and heightened focus on security is having a positive impact on Microsoft Windows in terms of fewer vulnerabilities."

Not everyone is as convinced, however. Michael Cherry, of independent analyst company Directions on Microsoft, cautioned not to read too much into the figures. "It's meaningless," he said. "I don't understand this obsession with the number, as if that's a meaningful metric."

Cherry said that the past doesn't necessarily correlate with the future. "As of today, they've looked at six months of Vista, but tomorrow they could be hit by a massive vulnerability, so does this have any predictive value going forward?"

Russ Cooper, a senior analyst with security vendor Cybertrust who also writes for 1105 Media, agreed. "Looking at desktop security from this perspective is useless. The question is whether I'm going to have compromised malware on my system or not. It's very, very clear that threats exist almost exclusively in the Windows world, that attacks happen almost exclusively in Windows."

Cherry is also suspicious of the less-than-scientific method of determining vulnerabilities. "Many problems in operating systems are reported by users over time. I'm not convinced there's enough eyes looking at Vista yet."

That doesn't mean that Cherry thinks Vista is insecure, or that Microsoft doesn't take security seriously. "Do I think Microsoft is doing a better job with security? Absolutely. Are they getting better all the time? Absolutely ... But in this business you don't live and die by how good you're doing, but the last time you messed up. This just seems to be an attempt to build Vista momentum."

Cooper said that six months isn't enough time to determine how secure Vista is. "We still have very few deployments and Vista-specific applications, compared to those [apps] that are Vista-compatible. We don't have software that uses the new programming model and leverages all these features that are new. For all we know, there's a fundamental flaw in there" that hasn't been discovered yet, and won't until more users are working with more programs, Cooper commented.

Cherry shared the assessment that more time is needed. "We're talking about an OS that, in essence, has a 10-year life (five years of mainstream support, and five years of extended support). After six months, you're trying to draw a trend line. In a year, you might have enough data to start to think about how it's doing."

In the meantime, Cherry said, "They're doing what we're expecting them to do. It doesn't warrant our holding a parade on their behalf."

About the Author

Keith Ward is the editor in chief of Virtualization & Cloud Review. Follow him on Twitter @VirtReviewKeith.

comments powered by Disqus

Featured

  • Compare New GitHub Copilot Free Plan for Visual Studio/VS Code to Paid Plans

    The free plan restricts the number of completions, chat requests and access to AI models, being suitable for occasional users and small projects.

  • Diving Deep into .NET MAUI

    Ever since someone figured out that fiddling bits results in source code, developers have sought one codebase for all types of apps on all platforms, with Microsoft's latest attempt to further that effort being .NET MAUI.

  • Copilot AI Boosts Abound in New VS Code v1.96

    Microsoft improved on its new "Copilot Edit" functionality in the latest release of Visual Studio Code, v1.96, its open-source based code editor that has become the most popular in the world according to many surveys.

  • AdaBoost Regression Using C#

    Dr. James McCaffrey from Microsoft Research presents a complete end-to-end demonstration of the AdaBoost.R2 algorithm for regression problems (where the goal is to predict a single numeric value). The implementation follows the original source research paper closely, so you can use it as a guide for customization for specific scenarios.

  • Versioning and Documenting ASP.NET Core Services

    Building an API with ASP.NET Core is only half the job. If your API is going to live more than one release cycle, you're going to need to version it. If you have other people building clients for it, you're going to need to document it.

Subscribe on YouTube