Feeds

Microsoft slapped for Windows-only Office patch

Mac patch on the way

  • alert
  • submit to reddit

Protecting against web application threats using SSL

Microsoft has defended its decision to release a Windows-only security patch for its Office program after a researcher warned it put Mac users of the software at risk.

Swa Frantzen, in a blog item posted to the SANS Institute's Daily Handler's Diary, said a bulletin Microsoft issued Tuesday violated the company's own position on "responsible disclosure," which admonishes security researchers to publicly divulge vulnerabilities only after a software maker has had time to fix them. What's more, he said the move would make it easier to attack Office for the Mac.

"We all know from past experience the reverse engineering of patches back into exploits starts at the time - if not before - the patches are released," Frantzen wrote. "Typically, it takes between hours and a few days or so to complete this if it's easy to exploit." He went on to note that even Microsoft's own bulletin warned that the flaws were easy to target.

The brouhaha erupted one day after Microsoft issued a patch fixing 14 vulnerabilities in PowerPoint, including one that Microsoft warned last month was being exploiting in "limited and targeted attacks" in the wild. Christopher Budd, Microsoft's lead security response spokesman, said the decision came only after a great deal of deliberation. Ultimately, he said, releasing the Windows updates ahead of those for the Mac ensured the greatest number of customers were protected.

"We've not faced this particular situation before, but after a lot of discussion what we decided to do is go ahead and provide updates for 100 percent of the customers on products that we have observed under these limited and targeted attacks while continuing the work on these other products," Budd told El Reg. "Ultimately, the deciding factor was what do we believe most effectively protects the customers."

Budd said Microsoft has yet to see attacks targeting the same PowerPoint flaws in Mac versions of Office, and he disputed Frantzen's contention that the Windows patches could easily be reverse engineered to write Mac-specific exploits. After realizing the PowerPoint patches were complete for Windows but not for the Mac, Microsoft took this information into consideration in deciding to release what it had rather than wait until it had all versions covered.

In addition to withholding a fix for Mac versions, Microsoft has also yet to deliver a patch for the PowerPoint version of its more slimmed-down suite called Works. While all the programs share certain vulnerable code, the exploits Microsoft researchers have seen to date work only on Windows versions, Budd said.

"To take an attack against Office of Windows and make it viable against those other two products requires a degree of retooling that frankly we don't see in the security research space right now," he said. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.