0 Members and 1 Guest are viewing this topic.
Microsoft Corp. issued its first patch for the just-released Windows 7 beta, but it passed on plugging a hole in an important file-sharing protocol that it fixed in older versions of the operating system. Windows Update, Microsoft's primary update service, began delivering the first patch to Windows 7 since the company struggled to launch the public beta last Friday. The update fixes a flaw that shaves several seconds of audio from any MP3 file that's edited, including files modified automatically as users connect to the Internet. "Without action on your part, all MP3 files that have large headers in your Windows Media Player and Windows Media Center libraries are likely to lose some audio," Microsoft said in the support document it published Saturday, several days after it first posted the fix to its MSND and TechNet subscription services. Before today, users who wanted to apply the fix had to find it, download it manually and install it themselves. Microsoft also recommended that users back up all MP3 files before doing an upgrade to Windows 7 from Windows Vista, and that they set all of them to "read-only" status by right-clicking each file in Windows Explorer and then clicking the General tab and selecting the "Read-only" box. Failing that, users should disable metadata automatic updates in Windows Media Player, Microsoft said. At the same time, it quashed the MP3 bug, however, Microsoft ignored a vulnerability in the Server Message Block (SMB) protocol that affects every version of Windows, including Windows 7. Microsoft explained why the flaw went unfixed. "We provide security updates for beta versions of Windows through Windows Update for Critical issues only," said Christopher Budd, a spokesman for the Microsoft Security Response Center (MSRC), in a post to the group's blog today. "So the vulnerability will be addressed in the next public release for Windows 7." Of the three bugs patched by the MS09-001 security update today, just one is pertinent to Windows 7, Budd added. That vulnerability, designated as CVE-2008-4114, is a denial-of-service bug rated "moderate," the second step in Microsoft's four-level scoring system. The remaining two vulnerabilities -- both labeled "critical" by Microsoft -- affect Windows 2000, XP and Server 2003; one of them also affects Windows Vista and Server 2008.
Brilliant !! what they did was store a ton of extra info in the mp3 header trying to be clever. The only problem is the MP3 file header size is limited to 16 kilobytes. Microsoft didn't bother to check if the added info (i.e. album art) exceeded 16k and just forced it into your MP3 files by default. Where the new data and existing header data exceeded 16k, Microsoft just blew your MP3 audio data away to make room.