Stephen Toulouse

Stephen Toulouse
Stephen Toulouse, also known as Stepto, former Director of Xbox LIVE Policy and Enforcement at Microsoft. He frequently represented Microsoft and Xbox Live in various media, including on Larry Hryb's "Major Nelson Radio" Xbox-related podcast, to discuss security and policy issues...
both incorrect record size somehow trigger using wrong
There's been some speculation that you can only trigger this by using an incorrect size in your metafile record and that this trigger was somehow intentional. That speculation is wrong on both counts. The vulnerability can be triggered with correct or incorrect size values.
against code convinced exploit matter reaction saw security team tested windows
We saw the exploit code and our Security Windows Reaction Team tested it against the patch, and we were convinced we would see an attack. It was only a matter of time,
began plan ready test track update weeks
Our test and engineering plan for that update that we began two weeks ago is on track to have that update ready for Tuesday.
attempted continue currently customers exploit help older operating protect publicly systems urge versions
Currently this exploit is not publicly available, but we continue to urge customers on older versions of our operating systems to deploy MS05-051 to help protect from attempted exploitation,
currently early phase released testing update
Currently that update is in the testing phase and could be released as early as April. But of course, that isn't final.
against applied available center correctly customers download install problem protect resolved situation update
This situation is now resolved and customers should be able to get the update. I want to reiterate that the problem had nothing to do with the update itself, you applied it manually from the download center or got it through SUS 1.0 it should install correctly and protect against the vulnerability. But it's available now for everyone.
currently early explorer firm however internet process testing update
We're working on an update to Internet Explorer and that update is currently in our testing process and could come out as early as April. However there's no firm date.
cumulative explorer internet night security update
We're working day and night on development of a cumulative security update for Internet Explorer that addresses the vulnerability.
applying customers recommend risk tested weigh
We have not tested this mitigation tool. We can't recommend it because we have not tested it...Customers should weigh the risk of applying something like this to their systems.
anybody customers hack leave might problems quick time whenever
We can't leave anybody behind. And unfortunately you might be introducing new problems. So whenever we look at even a quick hack ... it's got to be of quality. That's what customers have told us time and again.
impact partners seeing widespread
Certainly, right now, we and our anti-virus partners are not seeing a widespread impact of this attack.
best customers face helping meet protect provide secure security service talk valuable views
Security researchers provide a valuable service to our customers in helping us to secure our products. We want to get face to face with them to talk about their views on security, our views on security, and see how best we can meet to protect customers.
address against brought complete issue protect underlying update vulnerable
Should MS05-018 have been a more complete update to address the underlying vulnerable function? Yes, Cesar is right. But I want to reiterate that MS05-018 did protect against the issue that was brought to us,
affected far impact limited remain seeing shown widespread windows
It only affected Windows 2000. So far it has shown a very limited impact -- we're not seeing any widespread impact to the Internet, but we remain vigilant.