I must assume it would not cripple the use of TIF files. This would not be good for anyone. More than likely, this is an isolated vulnerability in the software, sort of a zero-day attack, but even I am not certain.I won't pretend to fully understand the purpose and scope of this "fix", but what it sounds like is not a fix, but a break. The only graphics that I saw that it effected were .tiff files, which as far as I have ran into are scan images. I don't recall ever downloading any of them otherwise. If that is true, then I don't see how a locally generated file could be infected or exploited, unless they are merely the target of something else. If they are only targets, then it would seem to me that this fixit is pointing at the wrong target itself.
Personally I have quite a few .tiff files that I produced on my own person scanner, and a program that I use that is not among those three MS products uses them. I see no reason to cripple the results of something that I have spent a very, very long time creating, based on something no more than some vague warning of some equally vague threat.
I understand that the fix is supposed to be only a temporary workaround, but that raises the question of what a true update for this purpose will do, and if it will cripple the use of .tiffs also?
If they fully explain the nature of the exploit, it will become more widely used. But, I do see where you are coming from.I guess your assumption is regarding the upcoming update, rather than the fix-it, because the latter clearly makes the use of the TIFs impossible. It is this kind of thing that I very much dislike about the way that MS handles such situations in general. They never really explain the nature of the problem so that the average person can access the potential risk, or explain any possible ramifications of applying their updates. They expect everyone to just accept their judgment on blind faith.
I don't question the seriousness of this, but I think that they could at least tell us whether this problem is one already in the wild, or merely a potential one. If the vulnerability has already been exploited, then telling us about it would be far more helpful to us, than to the exploiters. The out of cycle aspect only relates to the fix-it, not the update, and I'm not one to assume that it's release is necessarily because of an eminent risk, but may just be their method of covering their own tails.If they issue it out of cycle it is pretty bad.
The end-user license agreement precludes them from any liability to damaged hardware or software investments in nearly all of the software. The problem is that it was discovered by some guy at McAfee, it affects every version of Windows, and if anyone else finds out about it, it would probably become an eminent risk for outdated systems. If you have a good security suite, they've probably isolated the issue, but since Windows XP and Code Red (and all of that), it has been this way.I don't question the seriousness of this, but I think that they could at least tell us whether this problem is one already in the wild, or merely a potential one. If the vulnerability has already been exploited, then telling us about it would be far more helpful to us, than to the exploiters. The out of cycle aspect only relates to the fix-it, not the update, and I'm not one to assume that it's release is necessarily because of an eminent risk, but may just be their method of covering their own tails.