Free Republic
Browse · Search
News/Activism
Topics · Post Article

Washington Post also comented on this here:

Exploit Released for Unpatched Windows Flaw

1 posted on 12/28/2005 2:55:05 PM PST by Ernest_at_the_Beach
[ Post Reply | Private Reply | View Replies ]


To: ShadowAce; rdb3

Another one.....


2 posted on 12/28/2005 2:55:54 PM PST by Ernest_at_the_Beach (History is soon Forgotten,)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: All
From the Washington Post an excerpt:

According to an overnight post at the SANS Internet Storm Center, the link provided at Bugtraq when clicked on successfully drops a Trojan horse program (on) fully patched Windows XP SP2 machines. The Trojan will then download a fake anti-spyware/virus program which asks user to purchase a registered version of software in order to remove threats it claims are resident on the user's machine.

3 posted on 12/28/2005 3:01:21 PM PST by Ernest_at_the_Beach (History is soon Forgotten,)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Ernest_at_the_Beach

I don't understand why they keep calling this a browser exploit. It is strictly a Windows exploit. How the malicious WMF file is downloaded is irrelevant.


4 posted on 12/28/2005 3:01:54 PM PST by sigSEGV
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Ernest_at_the_Beach
This application prompts the user to enter credit card information in order to remove...

What? Your not supposed to enter your info?

LVM

5 posted on 12/28/2005 3:03:35 PM PST by LasVegasMac (The only thing slowing me down is the A**hole in front of me!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Ernest_at_the_Beach

A simple way of dealing with this until the patch is released is to change the .WMF file type to invoke something other than Windows Fax and Picture Viewer until this issue is resolved.


8 posted on 12/28/2005 3:08:39 PM PST by Company Man
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Knitebane; Squantos

Ping!


10 posted on 12/28/2005 3:11:49 PM PST by hiredhand (My kitty disappeared. NOT the rifle!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: All
More detail:

Microsoft Windows WMF Handling Arbitrary Code Execution

***********************


Microsoft Windows WMF Handling Arbitrary Code Execution

Secunia Advisory: SA18255 Print Advisory  
Release Date: 2005-12-28

Critical:
Extremely critical
Impact: System access
Where: From remote
Solution Status: Unpatched

OS: Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Web Edition
Microsoft Windows XP Home Edition
Microsoft Windows XP Professional

Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.

Description:
A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to an error in the handling of corrupted Windows Metafile files (".wmf"). This can be exploited to execute arbitrary code by tricking a user into opening a malicious ".wmf" file in "Windows Picture and Fax Viewer" or previewing a malicious ".wmf" file in explorer (i.e. selecting the file). This can also be exploited automatically when a user visits a malicious web site using Microsoft Internet Explorer.

NOTE: Exploit code is publicly available. This is being exploited in the wild.

The vulnerability has been confirmed on a fully patched system running Microsoft Windows XP SP2. Microsoft Windows XP SP1 and Microsoft Windows Server 2003 SP0 / SP1 are reportedly also affected. Other platforms may also be affected.

Solution:
Do not open or preview untrusted ".wmf" files and set security level to "High" in Microsoft Internet Explorer.

16 posted on 12/28/2005 3:21:59 PM PST by Ernest_at_the_Beach (History is soon Forgotten,)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Ernest_at_the_Beach

I'd imagine Javascript/ActiveX would need to be enabled for web sites to exploit the bug in IE but it doesn't say other than unregistering shimgvw.dll. That file doesn't even show up in Windows 98SE so I'm not sure if that OS is vulnerable, it appears to be XP and Windows 2003 Web Server only.


19 posted on 12/28/2005 3:28:48 PM PST by Reaganwuzthebest
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Ernest_at_the_Beach; ShadowAce
Bttt...
23 posted on 12/28/2005 3:44:18 PM PST by tubebender (You can't make Chicken Soup from Chicken Poop...)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Ernest_at_the_Beach
Windows users can protect themselves from this exploit by entering the following command:

Start - Run - regsvr32 /u shimgvw.dll

25 posted on 12/28/2005 3:46:26 PM PST by Company Man
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Ernest_at_the_Beach

If people would just read the screen they would not go much further. Bad grammar and misspelled words (see the screen shots above) should tip you off that you shouldn't click there.

We do computer repairs - it amazes me at the people who bring their computers in every month (and pay us 49 bucks) to get this crap removed. They click and download EVERYTHING! If it's free it MUST be OK!

We take in at least 490 bucks a week for this stuff.

Some folks just never learn or they don't want to learn.

Of course I am assuming that people who own computers will be able to determine bad grammar and misspelled words. Maybe I give too much credit....


28 posted on 12/28/2005 3:57:41 PM PST by msrngtp2002
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Ernest_at_the_Beach

bttt


29 posted on 12/28/2005 4:06:01 PM PST by shield (The fear of the LORD is the beginning of knowledge: but fools despise wisdom and instructions.Pr 1:7)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Ernest_at_the_Beach

More from Beta News:

'Really Bad' Exploit Threatens Windows
By Nate Mook, BetaNews
December 28, 2005, 1:30 PM
A new exploit has been discovered in the wild that affects fully patched Windows XP SP2 systems, according to reports by security firms F-Secure and Sunbelt. The malicious code takes advantage of a vulnerability in the WMF graphics rendering engine to automatically download and install malware.

WMF, or Windows Metafile, is a vector based image format used by Microsoft's operating systems. SHIMGVW.DLL is loaded to render the images and contains a flaw that opens the door for a malformed WMF image to cause remote code execution and potentially allow for a full system compromise.

Microsoft previously fixed a vulnerability affecting WMF and EMF files in November. That problem affected Windows 2000, XP and Windows Server 2003.

"We have a number of sites that we have found with this exploit. Different sites download different spyware. We only had a handful of websites using this new exploit but now we are seeing many more using this to install bad stuff. These image files can be modified very easily to download any malware or virus," said Alex Eckelberry, CEO of Sunbelt Software.

"I hit one site with a fully patched XP system last night and it was pretty intense -- it went right through and infected my machine."

F-Secure's Mika Pehkonen warned that, "Right now, fully patched Windows XP SP2 machines are vulnerable, with no known patch." The company is detecting the offending WMF files as W32/PFV-Exploit.A, .B and .C.

"Note that you can get infected if you visit a web site that has an image file containing the exploit. Internet Explorer users might automatically get infected. Firefox users can get infected if they decide to run or download the image file," Pehkonen added.

Microsoft has been notified of the issue and it could opt to issue an emergency patch, apart from its standard Patch Tuesday security bulletins. "We expect Microsoft to issue a patch on this as soon as they can," says F-Secure.

Sunbelt's Eckelberry echoes that sentiment: "Folks, I've seen it with my own eyes and this is a really bad exploit. Be careful out there."


38 posted on 12/28/2005 6:21:52 PM PST by Cicero (Marcus Tullius)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: nnn0jeh

ping


44 posted on 12/28/2005 11:14:52 PM PST by kalee
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Ernest_at_the_Beach

What if you turn off your spyware detection alert?


48 posted on 12/29/2005 4:23:00 AM PST by wolfcreek
[ Post Reply | Private Reply | To 1 | View Replies ]

To: rdb3; chance33_98; Calvinist_Dark_Lord; Bush2000; PenguinWry; GodGunsandGuts; CyberCowboy777; ...
OK. I'm late to this thread (I don't FReep during the evening lately).

Ping to those who haven't discovered it yet.

55 posted on 12/29/2005 6:50:09 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson