Microsoft has fallen victim to a software vulnerability in one of its own products when the W32.Slammer worm infested host machines on the company’s network, flooding that network with traffic.
The company's travails with Slammer late last week were first revealed through internal e-mail messages obtained by news agencies and reported on Monday.
A Microsoft spokesman said the Slammer worm penetrated the company's network defences and infected a number of SQL Server databases and desktop machines.
"There were circumstances where we were not patched," Microsoft spokesman, Rick Miller, said.
The vulnerable machines were mainly in the company's Redmond campus and concentrated in an area of Microsoft's network used by SQL Server developers, he said. In some cases, the vulnerable machines were purposely left unpatched to try to recreate specific environments for testing purposes.
Miller said that "a high percentage" of the SQL Server hosts used by customers were properly patched and unaffected by Slammer.
Slammer temporarily interrupted the company's Windows XP activation service, but the activation server was not vulnerable. Instead, the service was brought down by a flood of Slammer-related traffic from hosts on the same subnet, Miller said.
Given the size of the company, security experts weren't surprised that some machines on Microsoft's network were vulnerable.
"It's not surprising when you consider that most people working at Microsoft are (software) developers and that a lot of development software installs MSDE (Microsoft SQL Desktop Engine)," said David Litchfield, managing director of Next Generation Security Software and the person who discovered the SQL Server vulnerability exploited by Slammer.
Miller said infections linked to the MSDE component were a part of the company's problem, but declined to say how many servers and desktops were affected or how much of the problem stemmed from desktops with MSDE installed.
Some observers have taken Microsoft's inability to properly patch SQL Servers on its own network as proof that the current system of releasing software patches is flawed.
"I do feel it's an unreal expectation to think that system administrators can monitor multiple applications and apply patches to them that vary from implementation to implementation," PivX Solutions' chief hacking officer, Geoff Shively, said.
The volume of software patches from Microsoft and other software vendors and the need to test patches before deploying overwhelmed system administrators, leaving them to take their chances with a new worm or virus. That made companies like Microsoft vulnerable, Shively said.
"I think that people need to be more vigilant, but some people know there's a security vulnerability and still don't patch," Litchfield said.
The Slammer infestation shows that Microsoft is not immune to that problem.
"We struggle with the same problems as the rest of the industry," Miller said. "Individuals make patch management decisions for reasons of their own. Sometimes it's a time management issue and sometimes its oversight - particular developers not doing what they needed to do."
In light of the Slammer outbreak, Microsoft will re-evaluate its internal patch management policies. "The only thing I can say is that we've learned from this. The status quo is not acceptable and going forward we're going to be looking at procedures and doing things better," Miller said.
As part of its Trustworthy Computing initiative, Microsoft is looking into ways to streamline the patch management process.
"We feel that [patching] is critically important and recognise that there are problems with patch management," Miller said.
For the foreseeable future, the world - including Microsoft - would have to get by with the current system of manually downloading, testing and installing software patches, Litchfield said.
In the meantime, the revelation that Microsoft's own servers were not properly patched did not undermine the company's credibility in encouraging its customer to promptly patch their systems, Miller said.
"In our mind, what's critically important is that everybody patch their systems," he said. "The biggest lesson with this worm is that if you don't patch you're gonna get hit."