Full Disclosure mailing list archives

RE: Office 2000 Vulnerability


From: "Rainer Gerhards" <rgerhards () hq adiscon com>
Date: Wed, 10 Sep 2003 16:49:27 +0200

...  I guess this 
means network administrators have a small window of time to 
start patching 
up systems before a virus is released.  Does anyone know of 
a work around 
when updating Office 2000 with an update?  It asks for the 
original CD that 
Office was installed from.  Any thoughts?

Go get the CD from the software safe??

I can see a number of valid reasons for not having the CD at hand... but
this also raises some other question.

Let's assume someone is using a pirated office version. Or a pirate XP
key. Now Microsoft makes it impossible for those to apply patches. This
seems to be the case. I am not sure if they deny all patches (someone
from MS to comment?). Let's assume they deny providing things like the
DCOM patch or this office patch.

Now, the pirate machine is unpatched, probably becomes infected and thus
is turned into an attacker itself.

There are two ways to look at the root cause:

#1 the user pirated the software and as such is fully responsible for
whatever attack is carried out from his system

OR

#2 Microsoft knew that this system would carry out malicious action (the
denied patching knowingly) and thus is to blame

I would tend to #2, Microsoft should provide critical patches even to
pirate copies, just to make sure its actual customers are not hit by the
pirates, at least not with attacks. Of course, I see there are some good
arguments against this...

Does anybody know of what they actually do? And then the other
vendors...

In short: Is piracy becoming a mainstream source for attacks because
there is a tendency to deny updates to pirates in the industry?

Rainer

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: