Microsoft Issues Five New Security Warnings 576
smelroy writes "Microsoft on Wednesday issued security bulletins for five new software vulnerabilities, including a flaw in Visual Basic for Applications that the company rated as critical. The company has posted patches for each of the flaws on its Web site. Four of the problems affect Microsoft's Office desktop software.
You can read the story here and the security bulletins here."
deja vu (Score:5, Funny)
Re:deja vu (Score:4, Funny)
Re:deja vu (Score:5, Funny)
Re:deja vu (Score:3, Insightful)
Daniel
Re:deja vu (Score:5, Funny)
by Anonymous Coward on Thursday September 04, @10:11AM (#6868436)
Could this be a glitch in the Matrix?
Re:deja vu (Score:2)
by Winterblink (575267) on Thursday September 04, @10:11AM (#6868444)
*draws dual 9mms* It's a glitch in the Matrix. It happens when they patch something.
Two identical posts at the exact same time. Now that *has* to be a glitch in the Matrix!
Re:deja vu (Score:5, Funny)
Re:deja vu (Score:5, Funny)
Re:deja vu (Score:4, Funny)
Re:deja vu (Score:5, Funny)
Re:deja vu (Score:3, Funny)
and very likely leaves you infected with a virus.
Re:Minneapolis references on /. (Score:4, Funny)
Is there some sort of ANSI standard-Strip-club-naming-convention that I'm not aware of?
Re:deja vu (Score:5, Funny)
Voice over: It's the wheel of glitches.
Location: M$aFT glitch preserve.
M$aFT Tour Guide: The life cycle of the glitch is an often fast and furrious one, many only living for a few short days upto a few months typically. Although on some low exposure less used systems they may obtain a Methuselahn life span of a several years.
slight pause
Tour Guide Continues: Here at the M$aFT glitch preserve we try to breed and raise our glitches for survival in the wild.
Interupting Guide Tour member: Why do you breed and raise glitchtes anyway? Aren't there enough bugs in the wild already. I mean
Cutting off the Tour member Tour Guide: They are glitches, not bugs. As far as the number of glitches in the wild each glitch performs important ecological functions. There are some that encourage users to upgrade their Office packages, there are others that spark the need to upgrade development IDEs and there are others still that motivate upgrades to new versions of our glitch preserve, uh, I mean OS.
Re:And yet, look at my sig for Linux vulnerabiliti (Score:3, Insightful)
Rather than excuse Linux, I think the people hate these MS warnings most of all because MS-users, unlike most Linux users, don't patch their systems. What normally ensues within a couple of weeks of the vulnerabilitie
Re:And yet, look at my sig for Linux vulnerabiliti (Score:4, Informative)
Re:And yet, look at my sig for Linux vulnerabiliti (Score:5, Insightful)
I better hurry to run off and patch a hole in some obscure OSS app I don't have installed as opposed to the constant REMOTE ROOT EXPLOITS in the core Microsoft OS.
Re:Face it, Linux is popular enough. (Score:5, Informative)
It is the distro's job to make sure you are protected when a new exploit is discovered just as it's Microsoft's job when the problem is in windows. Also, if you think anyone accepts accountability for the problem in windows land you may want to read through the EULA again because it sure isn't MS.
Linux distros get bashed just as much over this and some of us actually avoid the distros with overly bad security records.
You also need to keep in mind that there is less downtime involved when upgrading Linux systems. My Linux servers are all fully upgraded but have not been shutdown in months. Window? 4 patches 3 reboots.. yuck
Autoupdate does not cover Office! (Score:3, Insightful)
Well, now you're out of luck. Joe Sixpack not only needs autoupdate on 24/7 he also needs to visit officeupdate to get the office patches: http://office.microsoft.com/ProductUpdates/defaul
Can MS make this more confusing for the average user? KB824993 and KB826292 do not show on a fresh Windowsupdate.com scan or with the MSBL tool.
Re:And yet, look at my sig for Linux vulnerabiliti (Score:3, Insightful)
Re:And yet, look at my sig for Linux vulnerabiliti (Score:3, Insightful)
And sendmail? Hardly a linux-specific application, wouldn't you say? Besides, most Linux distros no longer use it.
- A.P.
Re:And yet, look at my sig for Linux vulnerabiliti (Score:4, Informative)
atari800, gallery, eroaster, mindi, phpwebsite,
Now, how many of those are "linux" (i.e. the linux kernel, shell and important utilities.) None.
How many are remotely exploitable? None.
Given the user base of those 5 obscure programs, how many would *you* rate as critical?
Comment removed (Score:4, Insightful)
Re:And yet, look at my sig for Linux vulnerabiliti (Score:3, Informative)
If you use 5 different distros, and some fairly unusual apps, then gee, I guess you're right.
You should change to your handle to Overly Simplistic Guy.
Re:And yet, look at my sig for Linux vulnerabiliti (Score:3, Funny)
Re:And yet, look at my sig for Linux vulnerabiliti (Score:3, Funny)
Had me confused for a second (Score:5, Funny)
Confused me because I couldn't figure out why Microsoft was releasing bug reports for openoffice. (Aside from the obvious conspiracy theory that Microsoft would be trying to make the competition look bad)
what % of Windows is patches? (Score:3, Interesting)
There comes to a point where you just can't patch things anymore, and it's time to start over new. And, hopefully get it right this time!
Re:what % of Windows is patches? (Score:2, Interesting)
Will the next version of Windows be called
* MS Apache?
* Apache OS?
* WinApache?
(For those of you who don't know, Apache Webserver was called that because originally it was A-Patchy Server)
Re:what % of Windows is patches? (Score:5, Funny)
Re:what % of Windows is patches? (Score:5, Insightful)
Interesting? Come on.
Linux was released. Then patched. Then patched again. And again until it became what it is today.
Apache web server anyone?
Re:what % of Windows is patches? (Score:5, Funny)
Linux consists of 99%+ functionality patches
Windows consists of 182%+(*) security patches, many of which, unfortunately, have security issues
(*) Totals exceed 100% due to previous patches getting patched for new security issues.
--
Send us your Linux programming [librenix.com] articles
Re:what % of Windows is patches? (Score:4, Funny)
Re:what % of Windows is patches? (Score:2)
Re:what % of Windows is patches? (Score:2)
Re:what % of Windows is patches? (Score:5, Funny)
It should be a lot easier to pirate a copy of Windows when you can reconstruct the entire operating system by downloading patches directly from MS, and piecing them together like legos.
Re:what % of Windows is patches? (Score:3, Funny)
This is the origin of the apache servers name... (Score:5, Interesting)
Same old (Score:3, Interesting)
Re:Same old (Score:2)
critical VBA flaw (Score:5, Insightful)
Re:critical VBA flaw (Score:5, Insightful)
Re:critical VBA flaw (Score:5, Informative)
Re:critical VBA flaw (Score:3, Informative)
Re:critical VBA flaw (Score:5, Informative)
Sigh... it seems a day doesn't go by (Score:5, Funny)
Microsoft Issues Five New Security Warnings (Score:5, Funny)
1.SuSE
2.Red Hat
3.Mandrake
4.Debian
5.Gentoo
Snapshot Viewer affected? (Score:5, Interesting)
How I long for the old days of Novell... Ah...take me away!
Re:Snapshot Viewer affected? (Score:5, Insightful)
Ah, X-servers :-)
Re:Snapshot Viewer affected? (Score:4, Informative)
Sounds like what you are looking for is SUS [microsoft.com]. This will allow you to push security updates to your clients centrally.
Takes an afternoon to get set up and running, but after that, it runs with minimal intervention. Test your security updates, then authorize them to be distributed by the SUS server, and it takes care of the rest.
Of course, this assumes that you are running win2k or better on the client side. If not, you are stuck with logon scripting stuff for old machines. Not pretty. If you do have w2k or better, though, this is a huge timesaver. Works pretty good too. Those few that have already discovered it were able to stand on the sidelines, amused, as those who were trying to windows update machines one by one got eaten up by blaster.
Course, in fairness, there is another product that protects you from these kinds of worms, too... and it's sexy as hell. [apple.com]
Re:Snapshot Viewer affected? (Score:3, Informative)
Instead, for Office applications, you would just need to update the administrative install points (which I'm doing now) and using a client management system (SMS, LANDesk, Group Policies, what have you) to run a batch file that points to the administrative install point for the version of Office inst
Re:Snapshot Viewer affected? (Score:3)
Definately standalone, hardware has to be reasonable, but my thought is that if the machine sits slammed all day while clients download updates from it, so much the better... network throttling.
Like all MS stuff, it's all balanced on a bigger and bigger pile of buggy stuff, so it's not surprising that some of it doesn't work. In any event, those machines that don't get updates are probably broken anyway. So I'll sacrifice a couple machines to the worms just so I don't
Flaw IN Visual Basic? (Score:3, Funny)
office (Score:4, Interesting)
Re:office (Score:4, Informative)
Re:office (Score:3)
Office circumventing that security method is exactly like installing a doorbell only to find that the front door pops open regardless of whether it is locked or not when you press the doorbell button.
How does a doorbell and front door relate to this? Neither is adequate security but both were easily circumvented by a third party device that SHOULDN'T interfere. Blame should not be waived just because th
Doesn't make any sense.. (Score:3, Insightful)
It's just that I've never heard of anything so blatantly broken that is so successful.
Maybe I'm just angry because some scumware got into my computer system.
Re:Doesn't make any sense.. (Score:3, Insightful)
You are obviously not remembering the "good old days" very well. Every computer system is crummy. Linux is crummy. It's just a matter of how much we are paying for suckness.
At least Linux us honest about its suckworthyness. You don't see Linus making grand speeches about "Trustworthy" computing, or "Security through fill in the methodology". He and his cadre are out there coding for fun. They will tell you as much. Ma
Finally! They're fixing the bugs (Score:5, Insightful)
Trustworthy Computing (Score:5, Interesting)
My tinfoil cap has 2 pennies.
Final patch (Score:3, Funny)
Flaws in Visual Basic (Score:5, Informative)
One good thing (Score:2)
*slinks away to update co-workers machines*
woohoo! (Score:2, Funny)
xao
Latest Debian gnu/Linux seccurity warnings! (Score:5, Insightful)
[26 Aug 2003] DSA-374 libpam-smb - buffer overflow
[26 Aug 2003] DSA-344 unzip - directory traversal (new revision)
[18 Aug 2003] DSA-364 man-db - buffer overflows, arbitrary command execution (new revision)
[16 Aug 2003] DSA-373 autorespond - buffer overflow
[16 Aug 2003] DSA-372 netris - buffer overflow
[13 Aug 2003] DSA-358 linux-kernel-2.4.18 - several vulnerabilities (new revision)
[11 Aug 2003] DSA-371 perl - cross-site scripting
[09 Aug 2003] DSA-361 kdelibs, kdelibs-crypto - several vulnerabilities (new revision)
[08 Aug 2003] DSA-370 pam-pgsql - format string
[08 Aug 2003] DSA-369 zblast - buffer overflow
[08 Aug 2003] DSA-368 xpcd - buffer overflow
[08 Aug 2003] DSA-367 xtokkaetama - buffer overflow
Stop calling the kettle black! Fix your own problems. This stuff wouldn't happen if Debian didn't use out of date software, as most of the flaws mentioned were fixed in the new versions!
Re:Latest Debian gnu/Linux seccurity warnings! (Score:4, Insightful)
The MS bugs pertain to the MS release software that directly affect the OS and the Office suite. And I would only really consider the VBA and the OS security bulletins here as being that important as that is what affects Windows. So that's 2.
For debian we have 1. The rest are other software! If I wanted to talk about bugs with every piece of software being used in Windows, then let's do that. But clearly you're not.
Stop comparing apples to oranges.
Re:Latest Debian gnu/Linux seccurity warnings! (Score:3, Insightful)
Troll. Read the alerts/ Debian backports to stable (Score:4, Insightful)
Second, did you even bother to read those security alerts or investigate what the packages are? Briefly:
node: "Amateur Packet Radio Node program"
libpam-smb: arbitrary code, but no privilege escalation
unzip: no privilege escalation, no arbitrary code, and who uses it?
man-db: only if you go against install-time advice and make it setuid
autorespond: "This vulnerability is currently not believed to be exploitable due to incidental limits on the length of the problematic input, but there may be situations in which these limits do not apply."
netris: "A free, networked version of T*tris"
linux-kernel-2.4.18: most are local only, "STP protocol", or an nfs3 DOS with no arbitrary code or remote root
perl: yes, "execute arbitrary web script within the context of the generated page"
kdelibs: konqueror only, client only
pam-pgsql: arbitrary code, but no privilege escalation
zblast: "shoot 'em up space game"
xpcd: local only
xtokkaetama: local only
"This stuff wouldn't happen if Debian didn't use out of date software, as most of the flaws mentioned were fixed in the new versions!"
And this is why I call troll.
From Debian security FAQ [debian.org]:
"The most important guideline when making a new package that fixes a security problem is to make as few changes as possible. Our users and developers are relying on the exact behaviour of a release once it is made, so any change we make can possibly break someone's system. This is especially true in case of libraries: make sure you never change the Application Program Interface (API) or Application Binary Interface (ABI), no matter how small the change is.
This means that moving to a new upstream version is not a good solution, instead the relevant changes should be backported. Generally upstream maintainers are willing to help if needed, if not the Debian security team might be able to help.
In some cases it is not possible to backport a security fix, for example when large amounts of source code need to be modified or rewritten. If that happens it might be necessary to move to a new upstream version, but this has to be coordinated with the security team beforehand."
Slashdot just loves MS security bulletins (Score:3, Insightful)
What's the big deal here? Microsoft finds a flaw, issues the patches, get coverage from slashdot.
Things that happen all the time with unix/linux OS and apps.
Don't be mistaken, i ain't pro-Microsoft. I just think that slashdot is often bashing MS products for no reason. Their ideology is bad. The world domination plan is bad. But i'm tired of "hardcore" unix/C fanatics that dismisses
Whining and moaning everytime they issue a security warning is just plain childish...oh wait this is slashdot
Re:Slashdot just loves MS security bulletins (Score:5, Insightful)
I'm not dismissing it completely, but
Every bit helps (Score:5, Insightful)
I hope this wins some more business and government contracts for non-Windows based systems.
Windows is ok for some applications. But this sort of thing (actually a whole month of bad security press) should jar a lot of decision makers to recognize that MS is not the ONLY REAL OS OUT THERE, as there marketing strategy has led all non-tech inclined business execs to beleive.
The Truth will set you free.
NetBios Problem: Affected Platforms (Score:5, Funny)
Welcome to the family, WS2K3!
Re:NetBios Problem: Affected Platforms (Score:3, Informative)
Because, you know, servers need DirectX. Just like they need themes.
It's funny to laugh at Microsoft... (Score:4, Insightful)
This is a community of smart people, the race is on to figure out how to best solve this issue for our end users. Microsoft appears to be beating us by requiring far less updates to be applied than a randomly chosed Linux distro.
We need to think about the process of distribution and application of these patches, if we can get that right then we get a larger percentage of the desktop.
Today any undereducated end user who is judging security by the number of patches that jumps to a Linux distro because they've "heard" it is more secure will quickly be jumping back to Windows.
Re:It's funny to laugh at Microsoft... (Score:4, Insightful)
This is a fallacy, as Windows is closed source. Microsoft will fix only those bugs that are either publicly disclosed, mandated by some court case, or, sometimes, actually found internally by their undersized QA staff. So, of course, Microsoft will appear to have fewer patches. Also, have you considered that the maintainers of your randomly-chosen Linux distribution are actually honest and believe offering a patch is better policy than offering none to save face?
Open Source (open, transparent, honest)
Microsoft (closed, opaque, lying assholes)
Gee, who do we choose? Well, I guess we choose Microsoft, because they have fewer patches!
Re:It's funny to laugh at Microsoft... (Score:4, Insightful)
A) Linux and its associative apps are opensource so your going to find more security flaws due to the nature of opensource. This is a GOOD thing.
B) The ratio of packages per "average" linux distro vs. say 2k server or 2k3 server is what? 15 to 1? So judging by that fact its surprising that Microsoft continues to have as many problems as they do. When comparing correctly there is no comparison, MS loses hands down.
"... but we should really be debating how we get this right on an OSS platform. If I put RedHat9 next to Windows Server 2003 I have significantly more updates to apply to my Linux box."
Any admin who actually knows how to use update and secure both linux and windows would say different. With Microsoft patches there is decent chance that the patch will not only not work and require a second patch, but also might hose your system. All those admins who get nailed by worms aren't just lazy. Many of them have been burned by MS patches and choose just not to use them.
Let's also not forget about huge mega patch service packs that you have to use which are somehow ignored in your "count". Forgot about those huh? How many patches do these monsters hold? Hundreds? At a minimum. And of course nobody's system EVER gets hosed by service packs....
How about those great new restrictive licensing terms which get forced down your throat just because you want to secure your box?
Lastly even though 2k3 is better about it, I'll also enjoy not having to reboot my system for a simple patch. Don't you think average downtime should be added into the equation?
I'll take Red Hat's or any other linux vendors patching system any day of the week thanks.
On Principle (Score:3, Funny)
education and administration still the weak spot (Score:4, Insightful)
and apparently, windows users, left to their own devices don't know, or don't care about keeping up to date on security patches.
although, when enough of them are willing to just go ahead and doubleclick on any attachment from an unknown sender (msblast), these kinda exploits aren't really even necessary.
all the tools for a secure windows box are already there.
(though a security-patch-only windowsupdate flavor would be very helpful).
it's a good thing that microsoft (Score:3, Funny)
think- where we would be then?
Office Updates EXTREMELY Frustrating (Score:5, Insightful)
Plus, their order of updates is fux0r3d. They have the spell checker update listed as more recent than SP2, but when I run it I get an error message that the update only runs on SP1
It's bad enough to need so many patches, but there are many basic things like the above that Microsoft could easily improve.
Re:Office Updates EXTREMELY Frustrating (Score:4, Interesting)
It's not just a difference between SBE and Pro. It turns out that all Pros are not created equal. The newer machines here were set up in two batches several months apart. All have Office XP Pro, but we discovered when trying to install the patch that the newer Office CDs are not the same as the older ones. Patches on the newer Office XP Pro require a file called PRORET.MSI on the CD, while the less new Office XP Pro needs a file named PRO.MSI on the CD.
We figured this out after a frustrating attempt to patch my computer. A CD was in there, but the Office Updater didn't like it. It worked fine when we dug out the exact same CD that was originally used to install Office XP Pro on this computer.
Re:Office Updates EXTREMELY Frustrating (Score:3, Informative)
All of Microsoft's installers and patches these days are MSI packages, which you can use several available tools to make "transform" files that skip all the screens, EULAs, next presses, and CD check crap.
I believe the office administration kit is available for download from Microsoft's office website somewhere. I'll let a karma whore dig up the link.
Honestly... (Score:3, Interesting)
I'm not even sure this belongs on
Of course, MS isn't the only company to write such buggy software. But before anyone says a word about MS being bashed too much, let's remember that 95% statistic. When a company's software runs on approximately 95% of the world's computers, they have the moral responsibility to ensure its stability before they release it.
We could always blame sysadmins for being too stupid to check for and install updates, but instead, why don't we just educate people on why they should run Windows Update every week (or sooner).
I'd think billions of dollars in damages to the economy would be enough to get executives cracking the whip at their IT staff. Then again, I also thought Bush lost the election.
Re:Honestly... (Score:3, Insightful)
Really? I though America lost the election.
How Does This Affect Home Users Without the CD? (Score:3, Interesting)
In the corporate environment, this usually isn't a problem (except for the different flavors of Office we have floating around: MS Office Professional, MS Office Premium, MS Office Academic version, OEM non-retail version, etc. make it a pain).
However, home users may have MS Word and MS Excel pre-installed on their systems from the store. But they don't have the Office CD itself.
How can they apply the necessary MS Office patches and service packs?
Hmm. Does this affect OEMs? (Score:4, Insightful)
Requiring a CD = bad idea (Score:3, Interesting)
And Office Update process is broken. (Score:5, Insightful)
While I've just about managed to educate friends and familly about the need to run Windows Update, WU does not in itself warn of critical security issues - you have to remember to visit Office Update manually... and who is going to do that? No one, in my experience.
but it gets better - The Office Security updates require you to insert the original CD. This seems a mighty strange move, and not terribly useful for me since the CD is several thousand miles away locked up in a cupboard on the other side of the Atlantic.
Can anyone explain the warped logic here? I could understand it if the new patches enabled new functionality? but these are security patches.
Criticality of this is horribly underrated (Score:5, Informative)
This is critically important for all Windows MS Office users - "the user must open the attachment" is no protection because most users open attachments to see what they are.
If the infected Word Perfect document is given a
The vulnerability could also be exploited through a web page, and the user would get no chance to say "No" if ActiveX is enabled.
This isn't news... Office is a root kit... (Score:3, Interesting)
1. Open word
2. ALT+F11
3. Key in Shell "cmd.exe", VB_Normal_Focus
3. F5
This simple example runs a shell, but you can guess what happens when you can load a kernel debugger or alternative win32 shell and have system access.
This isn't shocking and I've seen everyone try to remove the DOS subsystem, rename net.exe and disable and even remove cmd.exe/command.com by using filesystem tricks and depending on windows lame application's handling of these tricks.
Basicly you can't secure a Windows machine in public use -- btw if you have acess to the usb port and a jump drive you can get in without a keyboard and send viri/spam/etc from someone else's machine.
Window's Office VBA system and IE are the ultimate root kit imho.
need to use BOTH update sites (Score:3, Informative)
Just a note that in order to be fully covered for MS patches, you have to use BOTH Windows Update [microsoft.com] and Office Update [microsoft.com].
The Windows Update service (automatic or manual) will not detect or install Office patches.
Comparing Red Hat updates to MS.. (Score:5, Interesting)
Re:Comparing Red Hat updates to MS.. (Score:3, Interesting)
I believe you mistyped because the facts say Redhat issues about 4 patches for every one that Microsoft releases.
I first noticed this myself last year after having installed Redhat 8.0 and subscribed to the redhat network and witnessed the slew of emails I began receiving warning me to run up2date.
But thats just my two cents and I'm sure there are a line of people out there to tell me I'm wrong and/or full of crap; but these are real wor
blame microsoft! (Score:3, Interesting)
Let's see:
Linux written by volunteers and small companies.
Windows written by a company with tens of billions in the bank.
Linux used mostly on servers and installed by educated admins.
Windows used by everyone from grandma to the CEO.
Linux on a small percentage of servers.
Windows on 96% of machines (or whatever the figure is). Windows used in ATMs, in medical equipment, by the government, etc., etc. The Microsoft antitrust ruling was typed out on a Windows machine.
And given their resources, their cash, the number of frickin' PhD's on the payroll, and the fact that the entire world economy depends on Windows crap OS (yes even us folks who use Mac/BSD/Linux are still affected indirectly)
They have a huge responsibility, and they have chosen not to meet it. Why? Is it so that the government will pass software quality laws that will place a huge burden on Free software, thus weakining it or killing it off?
Or is it because people have their heads in the sand and refuse to acknowledge that Microsoft is not worth the time and money any more. That's probably it. People are sitting there constantly patching their Windows boxes and not realizing that, hey, maybe there are alternatives. Microsoft has you all by the nuts.
Why are you guys making excuses for Microsoft? Microsoft's products should be the most secure on the planet given their resources and abilities.
I used to think, hey, all computers have problems, but after using software like qmail and OpenBSD, I realized, Microsoft is doing about 1% of what they could do. Even just closing ports and making email attachments not be executable would solve a lot of problems. They need to make their software more secure.
Instead they come up with Palladium or whatever it's called now, a gigantic complex scheme to solve this problem (and a lot of other imaginary "problems" too). Can't they try some simple stuff first?
So don't apologize for Microsoft, don't say "well, if Linux was everywhere we'd have the same problems"
Sweet quote from Seattle News (Score:3, Funny)
A nice quote [komotv.com] from KOMO [komotv.com], a station in Seattle (next door to Redmond for those that are unfamiliar with the area).
Many hours will be lost patching Word. (Score:4, Insightful)
To patch the security vulnerabilities in Microsoft Word, you have to 1) download the patch, 2) find the original Word CD and put it in the CD drive, 3) run the patch, 4) wait while a lot of processing is done with the CD, and 5) put the CD away again. It seems to me that, since this was a patch for a severe security vulnerability, Microsoft could have skipped the time-consuming 2, 4, and 5 steps. Think how many total hours will be lost throughout the world by users or computer professionals whose time is extremely valuable. The TCO just went up.
Re:Many hours will be lost patching Word. (Score:3, Informative)
I took this opportunity to install Office 2K SP3 plus these two fixes, and it easily eats 10 minutes per PC, to install about 12MB of patches. That could be done in 10 seconds.
Mitigating Factors (Score:3, Funny)
Well that last one is certainly good to know. If my information is going to be disclosed I'd certainly prefer that it be my random information rather than my much more valuable, um, organized information.
I'm wondering if there are not a team of "Mitigation Specialists" at Microsoft charged with coming up with these things. I think this is something I could handle pretty well. I think I'll send them a resume.
Here is a sample of my work:
Mitigating Factors:
* User must have not only installed Windows and Office, but actually be using these products for any harm to, or exposer of user data to occur.
~*~ Small pets, farm animals, or other domesticated wildlife will not be harmed by the use of these products, even if human user fails to exercise due caution.
*# Extra-Terrestrial life-forms are completely safe even when in the same room as an operating Windows environment.
I really think I could come up with a lot of these. How about you? Do you have a future as a Microsoft Mitigation Specialist?
M$ Security logic (Score:4, Funny)
A Microsoft spokeswoman told New Scientist the risk was lessened by the fact that exploiting any of the vulnerabilities would require a victim to open a document or carry out some other active task. She added: "We don't know of any worms being created."
Uh...Open a document? You mean like an email with the attached virus/worm that says: "Here is the document you requested"?
Sigh...Damage control must be getting lazy or something.
Word97 is out in the cold. (Score:4)
but that OfficeUpdate doesn't support Office97.
Head on over to the manual download section for
Office97. NOTHING TO BE FOUND RELATED TO
THIS in the office section. Under Word alone, the latest
update is from 2001.
Gee, go figure. Yet another reason to spend money
I don't have for a product I don't want.
Oh, and for all you astroturfers & M$ Fanboys -
at least when Linux does have a flaw, it doesn't
require me to spend 400 bucks on an upgrade to a
later, flawed version.
Re:Why Does Slashdot Care???!! (Score:5, Funny)
That doesn't make any sense. A Linux zealot can't even get a date, let alone several wives!
Re:I wonder how long before the new worm.. (Score:3, Funny)
was that written by ballmer perchance.