New updates; MS06-040-mania; OneCare success

Aug 13, 2006 09:09 GMT  ·  By

On Monday, Microsoft "has made the decision not to move forward with a Universal version of Virtual PC at this time." Microsoft postpones its Virtual PC software for Intel-based Macs, after Parallels presented its own virtualization application for running Windows on a Mac.

"The Macintosh business unit still recognizes that customers need access to Windows applications from their Intel-based Macs and feels confident that alternative solutions offered by Apple and other vendors, combined with a fully packaged retail copy of Windows will satisfy this need," the company sustained in a statement.

The giant's first program for Intel Macs is going to be Messenger 6.0, planned for later this year. It will enable users with instant-messaging applications on the Mac to communicate with those running Yahoo Messenger.

Maybe Microsoft is not prepared yet for the competition? Maybe the company is trying to avoid other competitor's products, and launch its own software later with improved features? We will find out in the next weeks.

On Tuesday, U.S. District Judge Kenneth Hoyt dismissed a patent-infringement suit filed by E-Pass Technologies against Microsoft and Hewlett-Packard over an E-Pass' patent related to a method for storing information from multiple individual credit cards in a single electronic multi-function card. "As a company that respects the intellectual property of others we are pleased that Microsoft prevailed on its non-infringement claim," Tom Burt, deputy general counsel for Microsoft, said in a statement.

Same day, as part of its monthly security update cycle, Microsoft released 23 updates for Office and Windows. Nine of them are rated critical, the company's highest severity rating. The most important update is Microsoft Security Bulletin MS06-040 - Vulnerability in Server Service Could Allow Remote Code Execution. "This update resolves a privately disclosed vulnerability as well as additional issues discovered through internal investigations. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. We recommend that customers apply the update immediately," it is said on the company website.

"This is the one that we're encouraging people to prioritize and put on the top of the stack for their testing and deployment. If immediate patching is not possible, Microsoft suggests using its workarounds," Christopher Budd, security program manager at Microsoft, sustained.

On Wednesday, the U.S. Department of Homeland Security has alerted Windows users to fix a flaw in the Microsoft operating system, by installing a patch released by the giant on Tuesday. "The Department of Homeland Security (DHS) is recommending that Windows Operating Systems users apply Microsoft security patch MS06-040 as quickly as possible. This security patch is designed to protect against a vulnerability that, if exploited, could enable an attacker to remotely take control of an affected system and install programs, view, change, or delete data, and create new accounts with full user rights. Windows Operating Systems users are encouraged to avoid delay in applying this security patch. Attempts to exploit vulnerabilities in operating systems routinely occur within 24 hours of the release of a security patch. This vulnerability could impact government systems, private industry and critical infrastructure, as well as individual and home users," it is mentioned in the alert.

It looks like Microsoft needs help from U.S. Departments to control its users. Homeland Security's action can represent a big hit in the giant's image. It seems like Microsoft's customers lost their confidence in the company and they refuse to install these monthly updates.

On Thursday, the MS06-040-mania continued. After the code which exploits a security hole in a Windows component related to file and printer sharing was published on Internet, the giant released a security advisory on its website.

"Microsoft is aware that detailed exploit code has been published on the Internet for the vulnerability that is addressed by Microsoft security bulletin MS06-040. Microsoft has verified the published exploit code to work on Windows 2000 and Windows XP Service Pack 1 only; this code does not affect Windows XP Service Pack 2, Windows Server 2003, or Windows Server 2003 Service Pack 1. At this time our investigation of this exploit code has verified that it does not affect customers who have installed the update detailed in MS06-040. While Microsoft was aware of very limited, targeted attacks that exploited the vulnerability prior to the release of the update, we are not currently aware of active attacks that use this newly posted exploit code nor are we aware of additional customer impact at this time. Microsoft is actively monitoring this situation in conjunction with our Microsoft Security Response Alliance partners and will keep customers informed and provide customer guidance as necessary."

On Friday, The NPD Group-Global Leader in Sales and Marketing Information, published a market research with details about Windows Live OneCare no. 2 place in sales at U.S.A. stores. The application includes antivirus, anti-spyware and firewall programs with backup abilities and several tune-up utilities for Windows PCs.

The antivirus and computer care solution recorded 15.4 percent of security suite sales at retailers.

"We see our comprehensive 'PC Care' approach as a new and important direction for consumer PC services and are encouraged to see that more consumers are taking steps to effectively protect and maintain their PCs," Samantha McManus, a business strategy manager at Microsoft, sustained in a statement.

Week's Conclusion: again, Microsoft image is ruined by its own products. It's Windows turn. Actually, is MS06-040 turn. No matter whose turn it is, the giant received a big hit with this security flaw. After the release of the patch, it looks like users refused to install the update, their confidence in company's ability to handle flaws being continuously decreasing. U.S. Department of Homeland Security alert was almost a need. So, what's next? We'll see it next week?

Photo Gallery (3 Images)

Open gallery