Feeds

Microsoft updates Mac Office 2008

Promises, promises

Combat fraud and increase customer satisfaction

Microsoft today released the latest in its ongoing series of updates to Office 2008 for Mac.

According to Microsoft, fixer-upper 12.1.5 "contains several changes that improve security, stability, reliability, and performance. Additionally, this update includes fixes for vulnerabilities that an attacker can use to overwrite the contents of a computer's memory by using malicious code."

The security updates in 12.1.5 are rated "Important" - although the same updates to Microsoft Office Word 2000 and Microsoft Office Outlook 2007 are rated "Critical". The updates to both Windows and Mac versions of Office patch vulnerabilities that "could allow remote code execution if a user opens a specially crafted Word or Rich Text Format (RTF) file," with the possible outcome of that nasty code taking "complete control of an affected system." Not good.

Direct from Redmond's Department of Tautology comes the description of stability improvements, which fix "an issue that causes Office 2008 applications to close unexpectedly when you open or use Office 2008 applications."

Microsoft also claims improved "performance in Excel and in PowerPoint when documents from a network share or from a shared folder on a virtual machine appear in the recently used files list;" plus improvements in Word 97-2004 formatting; tweaks to a slew of Excel functions, PivotTable sorts, and image placement; and - wait for it! - updated time zone information in Entourage.

All-in-all, 12.1.5 seems to be a worthy update - especially if you're an avid Excel user or if you'd prefer that some miscreant not "take complete control" of your Mac.

To take advantage of all this upgradey goodness, download the 103.6MB update here. Alternatively, you should be able to simply choose Check for Updates from any Office 2008 for Mac application's Help menu, but this option didn't yet work for us at 3:30 p.m. Pacific Standard Time.

Also remember that you may need to install previous updates before upgrading to 12.1.5. But hey, what's a few hundred megabytes of 12.1.1, 12.1.2, 12.1.3, and 12.1.4 downloads among friends? ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
IRS boss on XP migration: 'Classic fix the airplane while you're flying it attempt'
Plus: Condoleezza Rice at Dropbox 'maybe she can find ... weapons of mass destruction'
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.