Feeds

MS Love Bug cure worse than the disease?

It's sandbags at dawn...

  • alert
  • submit to reddit

The essential guide to IT transformation

Microsoft's remedy to the ILOVEYOU virus may cause more problems than the original virus.

As we reported Tuesday, Microsoft posted three patches as an answer to the Outlook email virus and its copycat cousins.

"Microsoft has reported several cases of functionality failure surrounding the Outlook updates. The most significant of these involves the updates' installation procedures," reports Windows Web site EntEnt.

Also affected are the updates themselves, users of Palm and Windows CE synchronisation software, recipients of PowerPoint presentations, users who route documents from Word, and a long list of third party software. According to Microsoft itself, there is no uninstall procedure and if the patch installation goes awry - as Microsoft has admitted has happened 'in some cases' the recommendation is to uninstall and then reinstall the Microsoft Office suite from scratch.

Only users of Outlook 97, Outlook 98, Outlook 2000 or Exchange Server are affected. The full list of glitches can be found here.s

But if the sound of pigeons coming home to roost could be heard when ILOVEYOU struck, then there should be enough for a string of The Birds sequels now.

Compared to the clunky but effective Java sandbox, Microsoft has no clean way of discriminating between legitimate file and disk accesses and what could be the destructive payload of a worm or virus. As an example of how indiscrimating this is, Microsoft warns: "When accessing the Address Book from within Word or Microsoft Excel, the prompt indicating a program is trying to access your Address Book is displayed."

Well obviously. But it shouldn't, should it?

After ILOVEYOU the lion's share of attention was focussed on the ease of scripting the virus, but this dealt with the propagation, not the payload. And, lest we forget, ILOVEYOU corrupted data files.

With its patches this week, Microsoft typically went for the symptoms, rather than try and tackle the root cause of the problem. And that's going to be a lot harder, as so many of Microsoft's own applications depend on the broken model. For example Microsoft warns users of the Small Business Customer Manager (SBCM) of the Microsoft Office Small Business Tools, "many prompts are displayed; however, the Customer Manager still works". And because emailed PowerPoint presentations are kicked off by a .js script, that's broken too.

So when Microsoft launches it's NGWS next month - which automates business to business data flows on a grand scale - we'll be curious to see if how it addresses security. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Kaspersky backpedals on 'done nothing wrong, nothing to fear' blather
Founder (and internet passport fan) now says privacy is precious
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.