XP SP3 Update, Outlook 2002

E

Emil Tonnesen

After installing SP3 i get the message "A program is trying to accsess
e-mailadresses you have stored in Outlook".

Here is a copy of the errormessage:
http://westie.no/emil/images/Skjermdumpbilde001.jpg

When is Microsoft planning a fix for this bug?
What to do now?

Installed compontents;
Win XP Pro
Norton Internet Security 2004 (incl. NAV2004).
 
E

Emil Tonnesen

TKS!
Is it possible to get a notification when a fix is available for Norton
Internet Security 2004?

Russ Valentine said:
It's not a bug. It's by design.
You may be able to get around the problem by either disabling Word as
your e-mail editor or updating some of your add-ins, especially virus
scanners. See the following article for more information:

http://www.slipstick.com/outlook/ol2002sp3.htm#problems

--
Russ Valentine
[MVP-Outlook]
Emil Tonnesen said:
After installing SP3 i get the message "A program is trying to accsess
e-mailadresses you have stored in Outlook".

Here is a copy of the errormessage:
http://westie.no/emil/images/Skjermdumpbilde001.jpg

When is Microsoft planning a fix for this bug?
What to do now?

Installed compontents;
Win XP Pro
Norton Internet Security 2004 (incl. NAV2004).
 
P

Pat

By POOR design. There is no reason why MS could not
identify the program accessing and allow the user to
create an 'exception' list of some kind for known
companion products. Worse yet... the web site for
regarding SP3 says:

Meaning I have absolutely no option but to completely
uninstall and reinstall withOUT SP3 if I want to continue
functioning until my vendor provides an update.

There were several possible options for MS to HELP
customers and 3rd party vendors get around this problem
with just a little flexibility. They chose not implement
any of them. I am forced to either stop using Outlook
altogether, run without my desired companion product or
run with less than optimum security. I am NOT an MS-
basher - but honestly believe that the leading software
manufacturer in the world could have and should have done
better.



-----Original Message-----
It's not a bug. It's by design.
You may be able to get around the problem by either disabling Word as
your e-mail editor or updating some of your add-ins, especially virus
scanners. See the following article for more information:

http://www.slipstick.com/outlook/ol2002sp3.htm#problems

--
Russ Valentine
[MVP-Outlook]
Emil Tonnesen said:
After installing SP3 i get the message "A program is trying to accsess
e-mailadresses you have stored in Outlook".

Here is a copy of the errormessage:
http://westie.no/emil/images/Skjermdumpbilde001.jpg

When is Microsoft planning a fix for this bug?
What to do now?

Installed compontents;
Win XP Pro
Norton Internet Security 2004 (incl. NAV2004).


.
 
S

Sue Mosher [MVP-Outlook]

FWIW, the security prompts are not a new issue. This security feature in
Outlook was introduced nearly 4 years ago. It has *never* been possible to
know which program is accessing a blocked property or method; it's just not
technically feasible, according to Microsoft (whose own programs are subject
to the same restrictions), within the existing Outlook programming context.

What's new in SP3 is the restriction of several properties that were
previously unrestricted, leaving Outlook vulnerable to address harvesting by
malicious programs. SP3 closes that security gap.

If an anti-virus program is triggering the prompts, you can turn its email
checking without losing any protection (and possibly gaining some overall
performance). The anti-virus program will still check attachments as you
open them, because Outlook saves a copy of the file to your hard drive and
then opens that copy, which the virus scanner will check first.

Bottom line is that I think Outlook 2002 with SP3 but without anti-virus
email scanning is more secure than OL2002 without SP3 and with anti-virus
email scanning.

Various vendors are working on updates. They have every reason to be upset
with Microsoft over this release, if they did not receive any advance
warning.

I agree, too, that Microsoft could have done a much better job of laying the
groundwork for this release with the end user. Certainly the KB article for
SP3 should have included information on these security changes on Day 1, not
toward the end of Day 3.

--
Sue Mosher, Outlook MVP
Author of
Microsoft Outlook Programming - Jumpstart for
Administrators, Power Users, and Developers



Pat said:
By POOR design. There is no reason why MS could not
identify the program accessing and allow the user to
create an 'exception' list of some kind for known
companion products. Worse yet... the web site for
regarding SP3 says:

Meaning I have absolutely no option but to completely
uninstall and reinstall withOUT SP3 if I want to continue
functioning until my vendor provides an update.

There were several possible options for MS to HELP
customers and 3rd party vendors get around this problem
with just a little flexibility. They chose not implement
any of them. I am forced to either stop using Outlook
altogether, run without my desired companion product or
run with less than optimum security. I am NOT an MS-
basher - but honestly believe that the leading software
manufacturer in the world could have and should have done
better.



-----Original Message-----
It's not a bug. It's by design.
You may be able to get around the problem by either disabling Word as
your e-mail editor or updating some of your add-ins, especially virus
scanners. See the following article for more information:

http://www.slipstick.com/outlook/ol2002sp3.htm#problems

--
Russ Valentine
[MVP-Outlook]
Emil Tonnesen said:
After installing SP3 i get the message "A program is trying to accsess
e-mailadresses you have stored in Outlook".

Here is a copy of the errormessage:
http://westie.no/emil/images/Skjermdumpbilde001.jpg

When is Microsoft planning a fix for this bug?
What to do now?

Installed compontents;
Win XP Pro
Norton Internet Security 2004 (incl. NAV2004).


.
 
D

Diane Poremsky

You'll need to check the Norton page or
http://www.slipstick.com/outlook/ol2002sp3.htm#problems - as soon as I learn
their update was released, I'll add a link to the page. I'm sure someone
will post to these groups as soon as it's ready as well.

--
Diane Poremsky [MVP - Outlook]
Author, Teach Yourself Outlook 2003 in 24 Hours
Coauthor, OneNote 2003 for Windows (Visual QuickStart Guide)





Emil Tonnesen said:
TKS!
Is it possible to get a notification when a fix is available for Norton
Internet Security 2004?

Russ Valentine said:
It's not a bug. It's by design.
You may be able to get around the problem by either disabling Word as
your e-mail editor or updating some of your add-ins, especially virus
scanners. See the following article for more information:

http://www.slipstick.com/outlook/ol2002sp3.htm#problems

--
Russ Valentine
[MVP-Outlook]
Emil Tonnesen said:
After installing SP3 i get the message "A program is trying to accsess
e-mailadresses you have stored in Outlook".

Here is a copy of the errormessage:
http://westie.no/emil/images/Skjermdumpbilde001.jpg

When is Microsoft planning a fix for this bug?
What to do now?

Installed compontents;
Win XP Pro
Norton Internet Security 2004 (incl. NAV2004).
 
P

Pat

I understand that identifying a calling program at
execution would be 'restricted' for security reasons. As
it should be. Would it not have been possible during
*installation*, however, to inspect registered
plugins/dlls to at least warn the user that this problem
might occur if installation continues. I would suggest
that if motivated to do so, well-designed software could
still include a way to allow specific and known
exceptions without compromising security. As it exists,
the warning message is worthless. How can anyone make a
decision to 'Allow' or not, when there is no information
on which to base that decision.

-----Original Message-----
FWIW, the security prompts are not a new issue. This security feature in
Outlook was introduced nearly 4 years ago. It has *never* been possible to
know which program is accessing a blocked property or method; it's just not
technically feasible, according to Microsoft (whose own programs are subject
to the same restrictions), within the existing Outlook programming context.

What's new in SP3 is the restriction of several properties that were
previously unrestricted, leaving Outlook vulnerable to address harvesting by
malicious programs. SP3 closes that security gap.

If an anti-virus program is triggering the prompts, you can turn its email
checking without losing any protection (and possibly gaining some overall
performance). The anti-virus program will still check attachments as you
open them, because Outlook saves a copy of the file to your hard drive and
then opens that copy, which the virus scanner will check first.

Bottom line is that I think Outlook 2002 with SP3 but without anti-virus
email scanning is more secure than OL2002 without SP3 and with anti-virus
email scanning.

Various vendors are working on updates. They have every reason to be upset
with Microsoft over this release, if they did not receive any advance
warning.

I agree, too, that Microsoft could have done a much better job of laying the
groundwork for this release with the end user. Certainly the KB article for
SP3 should have included information on these security changes on Day 1, not
toward the end of Day 3.

--
Sue Mosher, Outlook MVP
Author of
Microsoft Outlook Programming - Jumpstart for
Administrators, Power Users, and Developers



Pat said:
By POOR design. There is no reason why MS could not
identify the program accessing and allow the user to
create an 'exception' list of some kind for known
companion products. Worse yet... the web site for
regarding SP3 says:
To remove this download:
There is no uninstall feature for this download.

Meaning I have absolutely no option but to completely
uninstall and reinstall withOUT SP3 if I want to continue
functioning until my vendor provides an update.

There were several possible options for MS to HELP
customers and 3rd party vendors get around this problem
with just a little flexibility. They chose not implement
any of them. I am forced to either stop using Outlook
altogether, run without my desired companion product or
run with less than optimum security. I am NOT an MS-
basher - but honestly believe that the leading software
manufacturer in the world could have and should have done
better.



-----Original Message-----
It's not a bug. It's by design.
You may be able to get around the problem by either disabling Word as
your e-mail editor or updating some of your add-ins, especially virus
scanners. See the following article for more information:
http://www.slipstick.com/outlook/ol2002sp3.htm#problems
--
Russ Valentine
[MVP-Outlook]
After installing SP3 i get the message "A program is trying to accsess
e-mailadresses you have stored in Outlook".

Here is a copy of the errormessage:
http://westie.no/emil/images/Skjermdumpbilde001.jpg

When is Microsoft planning a fix for this bug?
What to do now?

Installed compontents;
Win XP Pro
Norton Internet Security 2004 (incl. NAV2004).




.


.
 
D

Diane Poremsky

Probably not - there are just too many that might or might not cause
problems and not all affected programs are installed as plugins. The warning
also doesn't give the name of the dll or application requesting access
because that information isn't passed to outlook.

It would have been better to have the information about the increased
security in release notes and links to the KB articles on the download page
(not released 3 days after the SP). They had a small beta test group and
apparently none of the testers used anti-spam software (the most common
software that triggers the warning) and the testers were not told of the
security changes, so it caught everyone, including MVPs, by surprise.
 
P

Pat

I agree that would have been better, however, I believe
that MS tries too hard to protect people from
themselves. Just because a software vendor "might or
might not cause a problem" does not mean that a program
should prevent a knowledgeable user or software vendor
from adding the value they seek to add. The warning is
at execution, not installation, so that comment is
irrelevant to my point.

The goal *should* be to minimize risk while maximizing
flexibility. The only way to elminate risk altogether is
to turn the computers off. It's about managing risk
appropriately. Ample notice to vendors would have
certainly been 'appropriate' and would also have fit into
MS current business paradigm. I will give you that it
was probably the only option at this point in the
product's evolution.

My beef is really a much larger conceptual one. If these
types of issues were considered at the inception of
product design - they most certainly *could* have been
allowed for. My opinions regarding the fundamental
values of sofware design are simply contrary to MS
culture in some ways. As a software engineer for over 20
years, I'm certain of the feasibility of this concept.
No software is perfect for all situations at all times.
Outlook is a great product, as is Windows. I sympathize
with the need to respond to security threats quickly. All
software must make compromises around different competing
requirements. I'm simply expressing one customer's
opinion that MS did not choose well with it's design
philosophy surrounding this issue - or it would not have
been an issue.

Additionally... since you say this issue was not
discovered during beta testing then I would suggest
another fundamental flaw exists - in the testing
methodology. There is really no excuse for this kind of
broadly impacting surprise in an organization the size of
MS. If avoiding this type of client impact were an
appropriate cultural value in the organization... then it
would not happen.



-----Original Message-----
Probably not - there are just too many that might or might not cause
problems and not all affected programs are installed as plugins. The warning
also doesn't give the name of the dll or application requesting access
because that information isn't passed to outlook.

It would have been better to have the information about the increased
security in release notes and links to the KB articles on the download page
(not released 3 days after the SP). They had a small beta test group and
apparently none of the testers used anti-spam software (the most common
software that triggers the warning) and the testers were not told of the
security changes, so it caught everyone, including MVPs, by surprise.


--
Diane Poremsky [MVP - Outlook]
Author, Teach Yourself Outlook 2003 in 24 Hours
Coauthor, OneNote 2003 for Windows (Visual QuickStart Guide)


Outlook & Exchange Solutions Center: http://www.slipstick.com


Pat said:
I understand that identifying a calling program at
execution would be 'restricted' for security reasons. As
it should be. Would it not have been possible during
*installation*, however, to inspect registered
plugins/dlls to at least warn the user that this problem
might occur if installation continues. I would suggest
that if motivated to do so, well-designed software could
still include a way to allow specific and known
exceptions without compromising security. As it exists,
the warning message is worthless. How can anyone make a
decision to 'Allow' or not, when there is no information
on which to base that decision.


.
 
G

Guest

i completely agree. The Beta testing for this release was severely flawed. In addition to the anti-spam software issue, the release also resurrects the Palm HotSync address book access issue. Given that Microsoft and Palm are competitors, it is reckless for them to have made this change without providing adequate notice to developers and users. Has this company learned nothing?


----- Pat wrote: -----

I agree that would have been better, however, I believe
that MS tries too hard to protect people from
themselves. Just because a software vendor "might or
might not cause a problem" does not mean that a program
should prevent a knowledgeable user or software vendor
from adding the value they seek to add. The warning is
at execution, not installation, so that comment is
irrelevant to my point.

The goal *should* be to minimize risk while maximizing
flexibility. The only way to elminate risk altogether is
to turn the computers off. It's about managing risk
appropriately. Ample notice to vendors would have
certainly been 'appropriate' and would also have fit into
MS current business paradigm. I will give you that it
was probably the only option at this point in the
product's evolution.

My beef is really a much larger conceptual one. If these
types of issues were considered at the inception of
product design - they most certainly *could* have been
allowed for. My opinions regarding the fundamental
values of sofware design are simply contrary to MS
culture in some ways. As a software engineer for over 20
years, I'm certain of the feasibility of this concept.
No software is perfect for all situations at all times.
Outlook is a great product, as is Windows. I sympathize
with the need to respond to security threats quickly. All
software must make compromises around different competing
requirements. I'm simply expressing one customer's
opinion that MS did not choose well with it's design
philosophy surrounding this issue - or it would not have
been an issue.

Additionally... since you say this issue was not
discovered during beta testing then I would suggest
another fundamental flaw exists - in the testing
methodology. There is really no excuse for this kind of
broadly impacting surprise in an organization the size of
MS. If avoiding this type of client impact were an
appropriate cultural value in the organization... then it
would not happen.



-----Original Message-----
Probably not - there are just too many that might or might not cause
problems and not all affected programs are installed as plugins. The warning
also doesn't give the name of the dll or application requesting access
because that information isn't passed to outlook.
It would have been better to have the information about
the increased
security in release notes and links to the KB articles on the download page
(not released 3 days after the SP). They had a small beta test group and
apparently none of the testers used anti-spam software (the most common
software that triggers the warning) and the testers were not told of the
security changes, so it caught everyone, including MVPs, by surprise.Diane Poremsky [MVP - Outlook]
Author, Teach Yourself Outlook 2003 in 24 Hours
Coauthor, OneNote 2003 for Windows (Visual QuickStart Guide)Outlook & Exchange Solutions Center: http://www.slipstick.com
I understand that identifying a calling program at
execution would be 'restricted' for security reasons. As
it should be. Would it not have been possible during
*installation*, however, to inspect registered
plugins/dlls to at least warn the user that this problem
might occur if installation continues. I would suggest
that if motivated to do so, well-designed software could
still include a way to allow specific and known
exceptions without compromising security. As it exists,
the warning message is worthless. How can anyone make a
decision to 'Allow' or not, when there is no information
on which to base that decision.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top