Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Windows SERIOUS Security flaw-- (Link to patch fix )
Security Now ^ | 01-02-05

Posted on 01/02/2006 9:57:45 AM PST by emiller

Quick Background:

The active exploitation of a very serious vulnerability in all versions of Windows was discovered in late December.

Word of this spread rapidly through the hacker community — many of whom where presumably on Holiday vacation from school, bored, and looking for something to do.

So several days later nearly one hundred different instances of exploitation of this newly discovered vulnerability had been found.

Note that this is not a "new vulnerability" — it (and perhaps other similar bugs) have been lying unknown in Windows since 1991. What's "new" is the discovery of this long-present vulnerability in WIndows' metafile processing.

Almost immediately there were reports of an MSN Messenger worm, and now F-Secure is reporting that "Happy New Year" SPAM eMail is carrying the exploit.

Anti-Virus vendors quickly updated and began pushing out their A-V signature files. This have been effective, but a new very flexible exploit generation tool has appeared that's able to create so many different variations of the exploit that A-V signatures are being bypassed.

Microsoft responded with an acknowledgement of the problem and a very weak workaround (the shimgvw.dll unregistration). But this is not

(Excerpt) Read more at grc.com ...


TOPICS: Crime/Corruption
KEYWORDS: internetexplorer; malware; patch; spyware; windows
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-75 next last
To: emiller

Thanks for the link; I'd not heard of Gibson before. Sorry it took all of four posts before the flamebait from Mac users came out.


41 posted on 01/02/2006 11:14:26 AM PST by Turbopilot (Nothing in the above post is or should be construed as legal research, analysis, or advice.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Revel
Saddly the patch does not cover win98.

Check to see if even you have the shimgvw.dll (Windows Picture and Fax Viewer Library) on your system. My two Windows 98 systems do not.

As I suspected, the wmf_checker_hexblog.exe file (which you'll find if you go to the linked article) reported that my Win98 systems are not susceptible to this exploit.

Here's a link to the file:
Download Ilfak's WMF Vulnerability Checker (3.6 kb)

42 posted on 01/02/2006 11:25:07 AM PST by holymoly ("A lot" is TWO words.)
[ Post Reply | Private Reply | To 32 | View Replies]

To: Prov3456

ping to self


43 posted on 01/02/2006 11:40:52 AM PST by Prov3456
[ Post Reply | Private Reply | To 2 | View Replies]

To: holymoly

Thank you. The GRC site says that windows 98 is affected. The test says it is not.


44 posted on 01/02/2006 11:54:54 AM PST by Revel
[ Post Reply | Private Reply | To 42 | View Replies]

To: Revel
Saddly the patch does not cover win98.

Try here. But be aware that this is not the same as Ilfak's patch. I have not tried it nor read any comments from anyone who has.
45 posted on 01/02/2006 12:05:02 PM PST by derllak
[ Post Reply | Private Reply | To 32 | View Replies]

To: emiller
I've seen a bit of posting about this particular windows defect, but one thing I've not really seen pointed out is that sites like FreeRepublic could easily be a vector for this attack. All someone has to do is post a link to an infected image, and *poof* everyone who loads that page gets toasted. If you're running windows, you should be very wary of any site you go to until you are fully patched to guard against this.
46 posted on 01/02/2006 12:09:23 PM PST by zeugma (Warning: Self-referential object does not reference itself.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: holymoly

What ever program views wmf files in win98 may still be vulnerable. It may be that these security companies are just ignoring telling us the details for windows98. Windows 98 is mentioned as being vulnerable in several places. I just can't find any details about it. Here is one link which lists all of the vulnerable operating systems.

http://www.securityfocus.com/bid/16074/info


47 posted on 01/02/2006 12:10:28 PM PST by Revel
[ Post Reply | Private Reply | To 42 | View Replies]

To: emiller

No patch for Windows 98, 98 SE or ME.


48 posted on 01/02/2006 12:15:38 PM PST by Baraonda (Demographic is destiny. Don't hire 3rd world illegal aliens nor support businesses that hire them.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: bnelson44

grc.com is a highly recommended site.


49 posted on 01/02/2006 12:28:44 PM PST by Baraonda (Demographic is destiny. Don't hire 3rd world illegal aliens nor support businesses that hire them.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Abcdefg

"Gibson Research is more trustworthy than Microsoft on security issues."

LOL! I must agree.


50 posted on 01/02/2006 12:30:16 PM PST by Baraonda (Demographic is destiny. Don't hire 3rd world illegal aliens nor support businesses that hire them.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Baraonda

Yes, but GRC lists win98 as vulnerable and then gives no details as to how. So how smart are they? It obviously is not vulnerable through the same DLL because win98 does not have that DLL. So why is GRC ignoring at least giving the details about windows 98?


51 posted on 01/02/2006 12:39:45 PM PST by Revel
[ Post Reply | Private Reply | To 50 | View Replies]

To: Revel
What ever program views wmf files in win98 may still be vulnerable.

According to my W98 help file, it uses "Kodak Imaging".

Note: Users of MSIE appear to be the most at risk. This Secunia Advisory states:

The vulnerability can also be exploited automatically when a user visits a malicious web site using Microsoft Internet Explorer.

This F-Secure advisory states:

Note that you can get infected if you visit a web site that has an image file containing the exploit. Internet Explorer users might automatically get infected. Firefox users can get infected if they decide to run or download the image file.

In our tests (under XP SP2) older versions of Firefox (1.0.4) defaulted to open WMF files with "Windows Picture and Fax Viewer", which is vulnerable. Newer versions (1.5) defaulted to open them with Windows Media Player, which is not vulnerable...but then again, Windows Media Player is not able to show WMF files at all so this might be a bug in Firefox. Opera 8.51 defaults to open WMF files with "Windows Picture and Fax Viewer" too. However, all versions of Firefox and Opera prompt the user first.
,

So, it would appear that using Firefox, Mozilla, or Opera would be an effective first line of defense against this exploit.

52 posted on 01/02/2006 12:59:20 PM PST by holymoly ("A lot" is TWO words.)
[ Post Reply | Private Reply | To 47 | View Replies]

To: Element187

"...and btw mac's do have plenty of virus's out there..."

I have to respectfully disagree.

I am an inveterate mac user (since 1985), web surfer and downloader. I do not run antivirus software. I have never had a virus on my Mac or had to work on a mac that had a virus except for once back in 1993 I think.

I am a systems admin and provide primary/secondary desktop support for approximately 200 PC's, and I can tell you that viruses/spyware/trojans are the biggest problem by far, bar none. They take up the vast majority of non-install/move types of issues.

We have around 20-30 Mac users and I have found the antivirus software to be more detrimental to the systems than ANYTHING else.

I am no Mac zealot (people ask me what kind of system to buy, and if it suits their needs I tell them to buy a PC) but there are nearly zero viruses out there in the wild infecting Macs. Are there vulnerabilities? Of course there are, every OS has them, even Linux (ESPECIALLY Linux in the hands of a novice)


53 posted on 01/02/2006 1:29:54 PM PST by rlmorel ("Innocence seldom utters outraged shrieks. Guilt does." Whittaker Chambers)
[ Post Reply | Private Reply | To 25 | View Replies]

To: bnelson44
Why would I want to get a Windows patch from a non-Microsoft site?

Because Microsoft is taking too long! Read the FAQ at sans.org to see how serious this is. They have taken the patch apart and even collaborated with the author in modifying it to run on more systems.

The really scary thing is someone could link an infected image file to one of the comments in this thread and you could become infected simply by viewing it.
54 posted on 01/02/2006 1:32:58 PM PST by derllak
[ Post Reply | Private Reply | To 3 | View Replies]

To: derllak

It is kind of comical in a perverse kind of way, the twisted mindset of the morons that distribute this kind of thing.

I can just image one of them having this internal conversation...

"Ain't this great!!!! All these weenie users out there are getting infected because of ME!! ME!!! I'll just mosey on over and check out CNN to see what they are saying about my virus...arhhhgg...darnit, how come I can't get to the CNN website? And my email server seems to be down..."


55 posted on 01/02/2006 1:37:33 PM PST by rlmorel ("Innocence seldom utters outraged shrieks. Guilt does." Whittaker Chambers)
[ Post Reply | Private Reply | To 54 | View Replies]

To: derllak

"The really scary thing is someone could link an infected image file to one of the comments in this thread and you could become infected simply by viewing it."

Have been researching this issue for the last 3 hours or so and your statement above is absolutely correct. In fact, the user does not have to click on anything to get infected. All he has to do is visit a web site (any site) that has imbedded in it a .WMF file. Moreover, a renamed .WMF file to, say, .jpg or .gif, will also infect the user as the programs that execute these .WMF files do not execute the file based on its file extention, but rather based on the .WMF file's code.

I don't know if I made any sense. I ain't not (syntax intentional.) even a beginner. But this is what I understood. So, correct me if wrong anyone.


56 posted on 01/02/2006 2:51:31 PM PST by Baraonda (Demographic is destiny. Don't hire 3rd world illegal aliens nor support businesses that hire them.)
[ Post Reply | Private Reply | To 54 | View Replies]

To: Revel
I have Windows 98 too. I guess Windows 98 is an older system and not worth a fix. I believe the fix for systems other than Win 98 is located here:
http://www.hexblog.com/2005/12/wmf_vuln.html
57 posted on 01/02/2006 3:05:44 PM PST by Baraonda (Demographic is destiny. Don't hire 3rd world illegal aliens nor support businesses that hire them.)
[ Post Reply | Private Reply | To 51 | View Replies]

To: emiller

While MicroSoft is fixing this, maybe they can get with Dell and fix the power management problems, so I can plug my printer into the USB on the back of the box.


58 posted on 01/02/2006 3:08:00 PM PST by OrioleFan (Republicans believe every day is July 4th, DemocRATs believe every day is April 15th. - Reagan)
[ Post Reply | Private Reply | To 1 | View Replies]

To: free_at_jsl.com

I am letting a friend try PCLinuxOS. It's a really nice live run distro.


59 posted on 01/02/2006 3:09:37 PM PST by dinodino
[ Post Reply | Private Reply | To 15 | View Replies]

To: zeugma

Some other freeper posted exactly what you are saying, and some mentally defective moderator removed the thread with the explanation, "Nonsense."

That moderator obviously doesn't comprehend the severity of this exploit.


60 posted on 01/02/2006 3:11:25 PM PST by dinodino
[ Post Reply | Private Reply | To 46 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-75 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson