Office 2003 SP3 blocks old file formats
The move was done for security, says Microsoft, but still bewilders users
Computerworld - Microsoft Corp. deliberately broke access to older files, including many generated by its own products, to step up security with the newest Office 2003 service pack, a company evangelist said yesterday.
The months-old Service Pack 3 (SP3) for Office 2003, said Viral Tarpara, a U.K.-based IT evangelist for Microsoft, blocks old file formats for security purposes. "Some older file formats, including some from Microsoft, are insecure and do not satisfy new attack vectors that hackers can use to execute malicious code," maintained Tarpara. "The decision to block the formats is strictly to protect your machine from being compromised."
Office 2003 SP3 was released in September, and questions about file access error messages began appearing almost immediately on Microsoft's support forums.
Those questions continued into December. A user identified as "dberwanger" complained that he called Microsoft's support desk, but was told it would cost $250 to "fix a problem with SP3 that they created. Finally completely uninstalled Word 2003 and reinstalled (because you cannot just uninstall SP3) and the problem is fixed."
Microsoft has posted a document to its support database that includes a Windows registry hack that returns full file format access to Office 2003. Like Tarpara, the document claimed that the file blocking was done for security reasons. "These file formats are blocked because they are less secure. They may pose a risk to you," according to the document.
Among the blocked files are older Microsoft Word, Excel and PowerPoint formats, as well as older formats used by Lotus 1-2-3 and Corel Corp.'s Quattro Pro -- a pair of ancient and aging spreadsheets -- and Corel Draw, an illustration program. Word 2003 with SP3, in fact, blocks a staggering 24 former formats, according to Microsoft, including the default word processing file format for Office 2004 for Mac, the currently available edition of Microsoft's application suite for Mac OS X.
IT administrators can download a group policies template from the Microsoft site to return formats from the dead, but individual users or smaller shops must instead edit the Windows registry, a daunting task that even Microsoft warns against. "Serious problems might occur if you modify the registry incorrectly," the company said in the support document. "Modify the registry at your own risk."
In a posting to a company blog yesterday, Tarpara recommended that rather than monkey with the registry, users convert documents in bulk to the OpenXML format -- Office 2007's default format -- using the tools in the Office Migration Planning Manager (OMPM) kit, which can be downloaded from Microsoft's site. "OMPM is great because it doesn't overwrite the original files at all, it simply makes a copy of the file in the new file format so there is no risk," said Tarpara.
Microsoft has touted Office 2007 and its OpenXML file format as more secure for months. And in May, the company unveiled Microsoft Office Isolated Conversion Environment, a tool for Office 2003 users that does a double file conversion on the fly to sanitize older formats by temporarily transforming them into OpenXML.
Related News and Discussion:
- With release near, Microsoft previews Mac Office 2008
- Alex Scoble: Is Microsoft Office too expensive? Not if you need it
- Online Office Suites: The Winner Is Clear
- Ding! Mac vs. PC cost analysis, Round II
- Ballmer: Linux users owe Microsoft
- Don't Believe the Hype: The 21 Biggest Technology Flops
- The 8 most dangerous consumer technologies
Read more about Security in Computerworld's Security Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts