There are quite a number of programs that break with the change. People have found some mitigation for some of them already.
See the comments here: http://isc.sans.edu/diary.html?storyid=9445 *ASB *(My XeeSM Profile) <http://XeeSM.com/AndrewBaker> *Exploiting Technology for Business Advantage...* * * Signature powered by <http://www.wisestamp.com/email-install?utm_source=extension&utm_medium=email&utm_campaign=footer> WiseStamp<http://www.wisestamp.com/email-install?utm_source=extension&utm_medium=email&utm_campaign=footer> On Thu, Aug 26, 2010 at 10:17 AM, Ben Scott <mailvor...@gmail.com> wrote: > On Thu, Aug 26, 2010 at 10:00 AM, Andrew S. Baker <asbz...@gmail.com> > wrote: > > Changing that decision more recently (via OS upgrade or patch) > > would have a debilitating impact on compatibility ... > > My beef is not that Microsoft valued compatibility, but that they > didn't take this vulnerability seriously until it was attacked. As > has been demonstrated, it is possible to change the default behavior > to be more secure while still allowing exceptions on case-by-case > basis. That's all I would ask for. But Microsoft ignored the problem > until it became an emergency. I do hold them accountable for that. > > I do wonder just how many programs will break if the default > behavior is changed. Of course, apparently Outlook relies on the "DLL > in CWD" behavior, so that's pretty significant. > > -- Ben > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~