Feeds

Microsoft: You know we said NO MORE XP PATCHES? Well ...

IE vuln forces rethink on mercy bullet for elderly OS support

Remote control for virtualized desktops

Microsoft has released patches for the latest critical security vulnerability plaguing Internet Explorer, including for Windows XP – despite months of claiming that it would never release another patch for the outdated OS past April 8 of this year.

According to a blog post by Microsoft's general manager of Trustworthy Computing, Adrienne Hall, Redmond only relented on its threat to leave XP users twisting in the wind because vulnerability CVE-2014-1776 was disclosed so soon after the patch cutoff date.

"Even though Windows XP is no longer supported by Microsoft and is past the time we normally provide security updates, we've decided to provide an update for all versions of Windows XP (including embedded), today," Hall wrote. "We made this exception based on the proximity to the end of support for Windows XP."

Whatever Microsoft's excuse, the decision is still an about-face. Back in September, the software giant was the first to warn that any bug discovered in XP after April 8 would essentially be "a 'zero day' vulnerability forever."

Change of heart ... Adrienne Hall

Now Redmond is going as far as to let us know that the patches went live at 10am PDT (5pm GMT) and that customers who don't have automatic updates enabled should hop on over to Windows Update and click "Check for Updates," like, nowish – despite the fact that Microsoft claims the vulnerability really isn't much of a big deal.

"The reality is there have been a very small number of attacks based on this particular vulnerability and concerns were, frankly, overblown," Hall wrote.

This, despite warnings from independent security experts – including UK and US government agencies – that Windows users should stay off IE altogether until Microsoft issues a fix.

What's more, Hall added, "Just because this update is out now doesn’t mean you should stop thinking about getting off Windows XP and moving to a newer version of Windows and the latest version of Internet Explorer."

Not that that would have done you much good before today. The bug that Thursday's patch fixes allows remote code execution – meaning it could let an attacker gain control of your system – and it affects all versions of Internet Explorer from 6 through 11, so even those running Microsoft's newest OS and browser should get a-patchin'.

When El Reg asked whether Thursday's patch was an indication that we can, in fact, expect future security updates for Windows XP, a Microsoft spokesperson pointed us to Hall's blog post but otherwise declined to comment. ®

Intelligent flash storage arrays

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.