[<prev] [next>] [day] [month] [year] [list]
Message-ID: <28915501A44DBA4587FE1019D675F983093C45@grfint.intern.adiscon.com>
From: rgerhards at hq.adiscon.com (Rainer Gerhards)
Subject: Office 2000 Vulnerability
> > ... I guess this
> > means network administrators have a small window of time to
> start patching
> > up systems before a virus is released. Does anyone know of
> a work around
> > when updating Office 2000 with an update? It asks for the
> original CD that
> > Office was installed from. Any thoughts?
>
> Go get the CD from the software safe??
I can see a number of valid reasons for not having the CD at hand... but
this also raises some other question.
Let's assume someone is using a pirated office version. Or a pirate XP
key. Now Microsoft makes it impossible for those to apply patches. This
seems to be the case. I am not sure if they deny all patches (someone
from MS to comment?). Let's assume they deny providing things like the
DCOM patch or this office patch.
Now, the pirate machine is unpatched, probably becomes infected and thus
is turned into an attacker itself.
There are two ways to look at the root cause:
#1 the user pirated the software and as such is fully responsible for
whatever attack is carried out from his system
OR
#2 Microsoft knew that this system would carry out malicious action (the
denied patching knowingly) and thus is to blame
I would tend to #2, Microsoft should provide critical patches even to
pirate copies, just to make sure its actual customers are not hit by the
pirates, at least not with attacks. Of course, I see there are some good
arguments against this...
Does anybody know of what they actually do? And then the other
vendors...
In short: Is piracy becoming a mainstream source for attacks because
there is a tendency to deny updates to pirates in the industry?
Rainer
Powered by blists - more mailing lists