Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Hackers Quickly Target Newly Disclosed Microsoft Flaw
TechWeb - InternetWeek.com ^ | February 10, 2005 | Gregg Keizer

Posted on 02/10/2005 7:31:00 PM PST by Eagle9

It didn't take hackers long to start banging hard on the vulnerabilities Microsoft disseminated Tuesday.

Just a day after the Redmond, Wash.-based developer rolled out a dozen advisories

containing 16 vulnerabilities, 10 of them tagged as "Critical," exploit code has gone public for one, Microsoft said late Wednesday.

"Microsoft won't be happy that someone has posted information about how to take advantage of their critical security hole within 48 hours of their patch being released," said Graham Cluley, senior technology consultant for Sophos, in a statement.

"Many computer users are bound to have not yet defended themselves," he added.

Microsoft posted an online advisory to its Web site, confirming that exploit code exists. "Microsoft is aware of exploit code available on the Internet that targets an issue addressed this week by the update released with Microsoft Security Bulletin MS05-009," Microsoft said.

The bulletin in question patched two vulnerabilities, one in Windows Media Player, the other in MSN Messenger and Windows Messenger, Microsoft's instant messaging clients. All three applications can be attacked using malformed PNG image files.

According to other security firms' analyses, the exploit code -- dubbed Exploit-PNGfile by McAfee -- can instruct the infected machine to run any payload the hacker bundles with it. Possible payloads could include such typical malware as Trojans, backdoor components, or worms to wrench control from the real user, or even spyware such as key loggers to steal information and identities.

Although exploit code is out and about, Microsoft said it had not yet seen any actual attack. "We will continue to actively monitor the situation and provide updated customer information and guidance as necessary," the advisory continued.

Microsoft said that patched systems were immune from the exploit, and outlined recommended steps for both individuals and enterprises that included updating both Windows and MSN Messenger for the former, and either uninstalling MSN Messenger or blocking it in the latter.

"MSN Messenger is not intended for corporate environments," Microsoft said. "Instead, use Windows Messenger, which is included with Windows."

Another option is to download the beta of MSN Messenger 7, which is not susceptible to the exploit.

One stumbling block in eliminating this vulnerability is that users must update MSN Messenger manually, since it's not part of Windows per se (unlike Windows Messenger, the similar-but-not-identical IM client bundled with the OS).

"Although there is an automatic update notification system present in MSN Messenger, it can take a long time for it to actually inform the user about a newer version," wrote Kaspersky Labs in its alert on the issue.

Core Security Technologies, the Boston security firm which first found the flaw and reported it to Microsoft in August 2004, said that the MSN Messenger bug was extremely dangerous.

"Due to the particular characteristics of the MSN Messenger communications protocol, exploitation of the vulnerability is likely to pass unnoticed to network Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and firewalls that do not implement decoding and normalization of the MSN Messenger protocol encapsulated within HTTP," the company said in its own advisory posted Tuesday.

Core also said that exploits could be crafted that would compromise unpatched machines "without crashing or disrupting the normal functioning of the MSN Messenger client application," making detection almost impossible by the end user.

"This vulnerability is serious," said Sophos' Cluley. "Everyone should ensure their systems are properly protected with the security patch at the earliest opportunity.


TOPICS: Technical
KEYWORDS: exploit; flaw; getamac; internetexploiter; lowqualitycrap; microsoft; securityflaw; vulnerable
Navigation: use the links below to view more comments.
first 1-2021-28 next last

1 posted on 02/10/2005 7:31:01 PM PST by Eagle9
[ Post Reply | Private Reply | View Replies]

To: ShadowAce

M$ Insecurity Ping!


2 posted on 02/10/2005 7:32:39 PM PST by KoRn
[ Post Reply | Private Reply | To 1 | View Replies]

To: Eagle9

> ... attacked using malformed PNG image files.

Amazing. PNG is a recent enough graphics file format that
I would have expected even Microsoft to heavily bounds-
check any code that reads it. Guess not.

From another report: "Media Player doesn't properly
handle .png files with excessive width or height."

Pick up jaw. Sigh.


3 posted on 02/10/2005 7:41:41 PM PST by Boundless
[ Post Reply | Private Reply | To 1 | View Replies]

To: Eagle9

After I get my PowerBook, this PC is going to be used for games and pretty much nothing else.


4 posted on 02/10/2005 7:43:54 PM PST by Terpfen (New Democrat Party motto: les enfant terribles)
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #5 Removed by Moderator

To: Boundless
Microsoft still hasn't even implemented transparency in PNG. I soemtimes wonder what microsoft coders do all day. They must have =lots= of meetings at microsoft.
6 posted on 02/10/2005 7:49:58 PM PST by zeugma (Come to the Dark Side...... We have cookies!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: zeugma
They must have =lots= of meetings at microsoft.

At least one per security hole...(and that's a lot of meetings)

7 posted on 02/10/2005 8:15:39 PM PST by sourcery (This is your country. This is your country under socialism. Any questions? Just say no to Socialism!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Boundless
Amazing. PNG is a recent enough graphics file format that I would have expected even Microsoft to heavily bounds- check any code that reads it

Not sure where you get this "recent enough" part. PNGS were available, royalty free circa 1996. We used them in a mud I was part of then.

8 posted on 02/10/2005 8:19:22 PM PST by Malsua
[ Post Reply | Private Reply | To 3 | View Replies]

To: Boundless

What do you expect from the company that, after all the Y2K hype, puts out a Win2K OS that required manual tweaking to make it Y2K compliant? There seems to be madness in their methodology.


9 posted on 02/10/2005 8:25:37 PM PST by trebb ("I am the way... no one comes to the Father, but by me..." - Jesus in John 14:6 (RSV))
[ Post Reply | Private Reply | To 3 | View Replies]

To: Malsua
They implemented the original basic PNG format, then as usual with microsoft. Left it in that half-assed state rather than actually fully implement the format. PNG supports transparency and animation similar to GIFs. From what I understand, Microsoft still doesn't support either.
10 posted on 02/10/2005 8:27:36 PM PST by zeugma (Come to the Dark Side...... We have cookies!)
[ Post Reply | Private Reply | To 8 | View Replies]

To: William Creel

I am as quick to jump on MS as the next guy, but they do have pateches out for this..


11 posted on 02/10/2005 8:28:31 PM PST by N3WBI3
[ Post Reply | Private Reply | To 5 | View Replies]

To: Boundless

yeah, wonder if they don't bother to look at the return value of malloc because it would slow down their bloatware even more


12 posted on 02/10/2005 8:29:31 PM PST by The Red Zone
[ Post Reply | Private Reply | To 3 | View Replies]

To: Eagle9

Simple solution. Update your computer.


13 posted on 02/10/2005 8:33:23 PM PST by Cicero (Marcus Tullius)
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma
PNG supports transparency and animation similar to GIFs. From what I understand,

Yes it does. The JPEG group was trying to extract royalties at the time. It's all so muddled right now, I can't comment accurately. PNGs are lossless. They are better than gifs.

14 posted on 02/10/2005 8:42:14 PM PST by Malsua
[ Post Reply | Private Reply | To 10 | View Replies]

To: All

Non-Microsoft Browsers Have Spoofing Flaw

Bad News About Firefox Security

15 posted on 02/10/2005 8:43:25 PM PST by yellowhammer
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cicero
Simple solution. Update your computer.

Not as much fun as bitching, apparently.

16 posted on 02/10/2005 8:45:57 PM PST by eddie willers
[ Post Reply | Private Reply | To 13 | View Replies]

To: Bush2000

Ping

17 posted on 02/10/2005 8:46:17 PM PST by yellowhammer
[ Post Reply | Private Reply | To 15 | View Replies]

To: Eagle9

A month from now they will have the new fix ...


18 posted on 02/10/2005 8:48:46 PM PST by John Lenin
[ Post Reply | Private Reply | To 1 | View Replies]

To: Malsua

>> PNG is a recent enough graphics file format ...

> Not sure where you get this "recent enough" part.
> PNGS were available, royalty free circa 1996.

Which is long after MS would have had corporate awareness
of buffer overflow exploits. They did, after all, include
anti-virus support in DOS 6.x years before that.

When did MS implement PNG support in Windows?


19 posted on 02/10/2005 9:09:43 PM PST by Boundless
[ Post Reply | Private Reply | To 8 | View Replies]

To: yellowhammer
That's actually misleading. After reading more about that vulnerability, it is not a vulnerability in the browsers per se, it is a vulnerability in the IDN standard, or more precisely, in the introduction thereof to a public not accustomed to dealing with the possibility of non-ASCII characters in hostnames. The only reason IE is not vulnerable is because IE still doesn't support IDN/Punycode, even after it's been around for 3-1/2 years.
20 posted on 02/10/2005 9:15:46 PM PST by B Knotts
[ Post Reply | Private Reply | To 15 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-28 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson