Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Worms Microsoft Security

Windows XP Flaw 'Extremely Serious' 630

scottott wrote to mention a Washington Post article with the news that the security hole we mentioned on Wednesday has widened. Computers can now be infected just by visiting infected web sites, or looking at images in the preview panel of older versions of Outlook. From the article: "At first, the vulnerability was exploited by just a few dozen Web sites. Programming code embedded in these pages would install a program that warned victims their machines were infested with spyware, then prompted them to pay $40 to remove the supposed pests. Since then, however, hundreds of sites have begun using the flaw to install a broad range of malicious software. SANS has received several reports of attackers blasting out spam e-mails containing links that lead to malicious sites exploiting the new flaw, Ullrich said."
This discussion has been archived. No new comments can be posted.

Windows XP Flaw 'Extremely Serious'

Comments Filter:
  • by Anonymous Coward on Friday December 30, 2005 @09:54AM (#14364189)
    Er... Microsoft Office and Internet Explorer do run on Linux using wine.
  • Browser appliance (Score:5, Informative)

    by QuaintRealist ( 905302 ) <quaintrealist&gmail,com> on Friday December 30, 2005 @09:54AM (#14364191) Homepage Journal
    If you use Windows, go get the vmware browser appliance and use it - connecting to the internet through a virtual machine is like wearing gloves in the OR - it's just common sense.

    http://www.vmware.com/vmtn/vm/browserapp.html [vmware.com]
  • Temporary Solution (Score:5, Informative)

    by Hank Chinaski ( 257573 ) on Friday December 30, 2005 @09:55AM (#14364194) Homepage
    run
    regsvr32 -u %windir%\system32\shimgvw.dll
    until a patch is released.
  • by Murphy Murph ( 833008 ) <sealab.murphy@gmail.com> on Friday December 30, 2005 @09:56AM (#14364201) Journal
    Start-->Run-->regsvr32 /u shimgvw.dll

    You lose thumbnail view, and a few other (minor) built-in-Windows-picture-viewing tools break, but you use IrfanView anyway, don't you?
  • by Anonymous Coward on Friday December 30, 2005 @10:02AM (#14364235)
    scottott wrote to mention a Washington Post article with the news that the security hole we mentioned on Wednesday has widened. Computers can now be infected just by visiting infected web sites, or looking at images in the preview panel of older versions of Outlook.

    There are two major factual errors here. One, the security hole has not "widened" - the scope of exposure is exactly what we read about Wednesday. Using shimgvw.dll to view a specially constructed WMF file results in system compromise (web site viewing of malicious WMF, previewing, opening w/MS picture and fax viewer, etc). The hole is exactly the same - exposure has increased, but the hole has not widened. Two: the web sites are not infected, they are malicious. The system is infected after visiting a malicious web site.

    The full (well, as full as it is now) MS advisory is here [microsoft.com]. I'm not very pleased with how MS is handling this at all, but that does not excuse this shoddy "journalism". How hard is it to state facts correctly? All you had to do was change a few words, and it would have read much more accurately:

    scottott wrote to mention a Washington Post article with the news that the security hole we mentioned on Wednesday is now affecting many more users. Computers can now be infected just by visiting malicious web sites, which are now rapidly increasing in number, or looking at images in the preview panel of older versions of Outlook.

    For the last sentence, note that I sent mysefl WMF files win Outlook 2000 and 2003 while running Sysinternals process explorer and never saw shimgvw.dll called. Opening a WMF attachment called it, but not previewing, so there might be three errors, but I didn't test all versions that way, so I don't know...
  • by TrueBuckeye ( 675537 ) on Friday December 30, 2005 @10:05AM (#14364245) Journal
    Keep in mind that this will disable thumbnail previews. Some have experienced problems opening any image file after unregistering this dll.

    It isn't a bad idea to do, but before you do it in an enterprise environment, be sure you test it and are ready for the calls it will cause.
  • by Chmcginn ( 201645 ) on Friday December 30, 2005 @10:06AM (#14364252) Journal
    Because the vulnerability exists within a faulty Windows component, security experts warn that Windows users who eschew Internet Explorer in favor of alternative Web browsers, such as older versions of Firefox and Opera, can still get their PCs infected if they agree to download a file from a site taking advantage of the flaw.
    Agreeably, you shouldn't be downloading from websites you don't trust anyway... but as anyone who's ever had a computer-illiterate relative or spouse can tell you, sometimes... "But, I really wanted to play that 87th degree derivation of breakout!"

    Okay, really, she said Arkanoid, but you get my point.

  • by a_n_d_e_r_s ( 136412 ) on Friday December 30, 2005 @10:06AM (#14364253) Homepage Journal
    Its in one of Windows standard libraries - but using IE makes it more dangerous.

    Using Firefox with Adblock installed one can stop all files of this dangerous type by adblocking them until a patch is available.
  • by $RANDOMLUSER ( 804576 ) on Friday December 30, 2005 @10:07AM (#14364255)
    Er.... Mac and Linux machines are no more succeptable to Windows XP exploits than you are to kennel cough or feline leukemia.
  • MOD PARENT UP (Score:5, Informative)

    by brunes69 ( 86786 ) <[slashdot] [at] [keirstead.org]> on Friday December 30, 2005 @10:07AM (#14364256)
    If all you are doing is browsing the web, there is absolutely no reason to not do it in a sandbox. In fact, I don't get why all browsers run in sandboxes. Why do they *ever* need access to the host OS? If they need to save downloaded files, they can do so via a mounted share. At least in a sandbox they cannot execute privilidged code, at most they could infect executabes on said share.

  • Re:Solution (Score:5, Informative)

    by KilobyteKnight ( 91023 ) <bjm@midso u t h . r r .com> on Friday December 30, 2005 @10:09AM (#14364269) Homepage
    Get another browser, such as Opera of Firefox.

    This is not an ie flaw. This is a Windows flaw. You can still be affected with other browsers, you just have to try harder. Anything using the Windows DLL that does the WMF processing will be affected.
  • by discordja ( 612393 ) on Friday December 30, 2005 @10:09AM (#14364271)
    just "regsvr32 shimgvw.dll" the DLL back in. the /u is merely a flag to unregister it.
  • by WhoDey ( 629879 ) on Friday December 30, 2005 @10:12AM (#14364286) Homepage
    It's an exploit of functionality built into Windows (it allows you to view thumbnails in folders full of pictures, for example). The reason it's more dangerous with IE is that IE by default will open these files, while Firefox (or some other browsers) will give you the good old Open/Save box first. If you open at this point, you're still screwed.
  • by pissu_man ( 853656 ) on Friday December 30, 2005 @10:17AM (#14364318)
    For those who are ranting about FF. Read the article, says that older versions of Opera and FF are vulnarable too - on Windows ofcourse.
  • Re:RootKit Revealer (Score:5, Informative)

    by GigsVT ( 208848 ) * on Friday December 30, 2005 @10:18AM (#14364322) Journal
    You can't prove a rootkit doesn't exist on your system, unless you have a checksum database on read only media, and some sort of hardware (not firmware) method of computing those checksums.

    You can't even be reasonably sure of it without at least some checksumming system like tripwire.

    All you are doing is scanning for certain known rootkits. That's a weak strategy that's reactive and guaranteed to fail some of the time.
  • Re:Another /. dupe (Score:3, Informative)

    by Anonymous Coward on Friday December 30, 2005 @10:20AM (#14364332)
    Since last time it has been reportet that this can also be exploited by renaming infected wmf files to other image formats like jpg, gif and tif:
    http://www.securityfocus.com/archive/1/420378/30/0 /threaded [securityfocus.com]
  • by value_added ( 719364 ) on Friday December 30, 2005 @10:23AM (#14364345)
    Start-->Run-->regsvr32 /u shimgvw.dll

    Good idea. But how do you "reactivate" this feature once a patch is released? I use Ifranview, but I also depend heavily on the thumbnail feature in explorer.


    Sigh. I do wish people would offer some information with their click here/type-this instructions so people would understand WTF they're doing.
    regsvr32 - This command-line tool registers .dll files as command components in the registry.
     
    regsvr32 /u /s /n /i[:cmdline] dllname
     
    /u unregister server
    /s silent
    /i call DllInstall passing it an optional cmdline, when
            used with /u calls dll uninstall
    /n do not call DllRegisterServer; this option must be used
            with /i
    To register (or re-register) the dll:
    regsvr32 shimgvw.dll
    To run the command, you can use a console window (cmd.exe), or the Run dialog box (accessible from the Start Menu).
  • by jafiwam ( 310805 ) on Friday December 30, 2005 @10:24AM (#14364355) Homepage Journal
    That's not enough.

    The flaw can be used with a JPG file (read; the image of the button, or the site seal, or the photo) in the web page.

    And since the flaw is in data in the header of the WMF file type, it can be executed even if the file extension is not WMF.

    In other words, if you are seeing images on web pages with Windows, you can get this. No downloading is necessary even in other browsers. Until it's patched, the only true safe method is unregister the DLL or don't get on the internet with Windows at all.

    As an FYI, I had to deal with this thing several weeks back when it was rare. (The bimbo doesn't remember what web site did it.) IF you do, just pull the drive, mount it on another machine, get your data, and wipe the damn thing. It's a really really tough infection to clean. It screwed the OS more ways than Courtney Love and ate so much CPU it was unusable. PLUS it downloaded other stuff and started to try to infect other machines on the network.

    Shoot to kill this one guys, the patient is already dead.
  • IDS signatures (Score:5, Informative)

    by Cally ( 10873 ) on Friday December 30, 2005 @10:26AM (#14364361) Homepage
    The Microsoft advisory says:
    ** Are there any third party Intrusion Detection Systems (IDS) that would help protect against attempts to exploit this vulnerability?

    While we don't know of specific products or services that currently scan or detect for attempts to render specially crafted WMF files, we are working with our partners through industry programs like VIA to provide information as we have it. . Customers should contact their IDS provider to determine if it offers protection from this vulnerability.

    Snort sigs have been available from BleedingSnort [bleedingsnort.com] for some time now; I pushed them out to our corporate IDS yesterday morning.

    (Warning, mangled by Slashcode - remove newlines)

    #by mmlange alert tcp any any -> $HOME_NET any (msg:"BLEEDING-EDGE CURRENT WMF Exploit"; flow:established; content:"|01 00 09 00 00 03 52 1f 00 00 06 00 3d 00 00 00|"; content:"|00 26 06 0f 00 08 00 ff ff ff ff 01 00 00 00 03 00 00 00 00 00|"; reference: url,www.frsirt.com/exploits/20051228.ie_xp_pfv_met afile.pm.php; classtype:attempted-user; sid:2002734; rev:1;)

    # By Frank Knobbe, 2005-12-28 alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"BLEEDING-EDGE EXPLOIT WMF Escape Record Exploit"; flow:established,from_server; content:"|01 00 09 00 00 03|"; depth:500; content:"|00 00|"; distance:10; within:12; content:"|26 06 09 00|"; within:5000; classtype:attempted-user; reference:url,www.frsirt.com/english/advisories/20 05/3086; sid:2002733; rev:1;)

    Once again it looks like Microsoft are going to escape the 'perfect exploit' meltdown by the skin of their teeth. This is exploitable remotely, but Dr Evil can't sit at a console typing in arbitrary IP addresses to 0wn with the exploit. On the other hand you can get close to that sort of thing using Metasploit Framework [metasploit.org].

  • more serious (Score:5, Informative)

    by spacemky ( 236551 ) * <nick.aryfi@com> on Friday December 30, 2005 @10:31AM (#14364377) Homepage Journal
    And not only does the exploit work with .WMF (Windows MetaFile), but if the attacker renames it to, say, .JPG, Windows will detect this a really being a .WMF, and STILL execute it. Pretty serious stuff. See this [securityfocus.com] bugtraq link for details.
  • Re:Browser appliance (Score:5, Informative)

    by juhaz ( 110830 ) on Friday December 30, 2005 @10:40AM (#14364418) Homepage
    Too bad there was VMWare vulnerability [secunia.com] just a week ago that allows guest to execute abritrary code on host system.
  • by Anonymous Coward on Friday December 30, 2005 @10:44AM (#14364434)
    regsvr32 /i shimgvw.dll
  • by G Money ( 12364 ) on Friday December 30, 2005 @10:48AM (#14364463) Homepage
    What we have in the Linux and BSD world at least are very good Mandatory Access Control systems that help mitigate some of this risk. In the Linux world you can use SELinux (shudder) or use something even easier, AppArmor [novell.com]. If you properly profile an application to determine what it should and should not do you'll be in much better shape when new exploits like this come out. It won't save you from everything since they can still get access to anything the program could legitimately access in the first place but it's much more efficient than setting up sandboxes for everything like chroot and much more secure.
  • by molnarcs ( 675885 ) <csabamolnar AT gmail DOT com> on Friday December 30, 2005 @10:54AM (#14364518) Homepage Journal
    Never ever visit astalavista from windows, not even in Firefox - even using firefox, free-av catched ~10 viruses that tried to execute while only visiting the site, and searching for my lost cd key (well, lost CD to be precise, taht came with my TV card, with the only app that worked for me).
  • by makomk ( 752139 ) on Friday December 30, 2005 @10:55AM (#14364527) Journal
    In other words, if you are seeing images on web pages with Windows, you can get this.

    Not necessarily. I think Firefox at least uses its own image-rendering library, which is why it's harder to get infected if you're using it. (You have to open an infected file in some other suitable viewer i.e. one that uses the affected library).
  • Re:MOD PARENT UP (Score:3, Informative)

    by Aglassis ( 10161 ) on Friday December 30, 2005 @10:57AM (#14364546)
    Use

    runas /user:root_user "Whatever command goes here"

    Note: 'root_user' is whatever you have renamed your 'Administrator' account. You have renamed your 'Administrator' account, right?

    If you need a command prompt use

    runas /user:root_user cmd

    If you need IE for a Windows update use

    runas /user:root_user "C:\program files\internet explorer\iexplore.exe"

    and then go to the Windows Update site. If you need to do filebrowsing as a superuser use the same command, but then type "c:" in the address box.

    There is almost nothing that you can't do with runas. Additionally, XP makes it easier for most programs with "Run As" being a left-click item. While there are some programs that you need to log in to install (itunes was one for me), and there are some minor config issues to get certain applications to work (the ones that assume you are an Administrator). Nonetheless, I haven't used the Administrator account for normal user operations for about 7 years.
  • by thue ( 121682 ) on Friday December 30, 2005 @10:58AM (#14364552) Homepage
    Using Firefox with Adblock installed one can stop all files of this dangerous type by adblocking them until a patch is available.

    This comment [slashdot.org] says that you can't block it (ny blocking a file extention as is done in adblock), as Windows will execute the file as a .wmf even if the file is renamed to .jpg .
  • by julesh ( 229690 ) on Friday December 30, 2005 @10:59AM (#14364554)
    Why does the WMF rendering code need to run with any more permissions than: read a block of memory with the WMF file, and write a block with the rendered bitmap? (Or perhaps make display / GDI calls, if performance is a concern.)

    Because the WMF rendering code *is* GDI. Seriously - a WMF file is basically a list of GDI functions to call in order, along with the parameters to pass to them.
  • Depends. (Score:1, Informative)

    by Anonymous Coward on Friday December 30, 2005 @11:04AM (#14364580)
    If you come across this, you SHOULD get a dialog saying whether or not you want to open a WMF file (Save/Open/Cancel).

    However, if you configured FF such that the dialog no longer comes up (automatically opens files in default viewers), you're screwed.

    Also, there was a post back on Wednesday from a guy saying that he did, in fact, click "Cancel" but still got infected...
  • by Utopia ( 149375 ) on Friday December 30, 2005 @11:06AM (#14364592)
    Even better permanent solution. Turn ON DEP on all programs.

    From http://www.microsoft.com/technet/security/advisory /912840.mspx [microsoft.com]

    I have software DEP enabled on my system, does this help mitigate the vulnerability?
    Yes. Windows XP Service Pack 2 also includes software-enforced DEP that is designed to reduce exploits of exception handling mechanisms in Windows. By default software-enforced DEP applies to core operating system components and services. This vulnerability can be mitigated by enabling DEP for all programs on your computer.


  • Re:Firefox? (Score:5, Informative)

    by 99BottlesOfBeerInMyF ( 813746 ) on Friday December 30, 2005 @11:06AM (#14364594)

    You can be infected whenever Windows uses its default image viewer to display certain image types. This means there is a long list of applications that are vulnerable that rely upon the image viewer code, but as far as I know no one has yet compiled that list. Windows uses this code when previewing images (for example). The current way this is being exploited is to tell your web browser to open an image (wmf and jpg that I have heard about) in the picture viewer. On IE, this behavior defaults to happening automatically. That means you go to a page and it installs whatever code it wants. With Firefox, you go to a page and a dialogue asks to open a .jpg or .wmf file. If you agree, it installs whatever, but if you decline you're in the clear.

  • by $RANDOMLUSER ( 804576 ) on Friday December 30, 2005 @11:16AM (#14364644)
    At the risk of getting cluelessly flamed again:

    1) Yes, Virtual PC and WINE allow you to run Microsoft programs like Internet Explorer and Office.
    2) The vulnerability is in the Microsoft Windows Graphics Rendering Engine, which is a part of the Windows kernel, and is why the exploit affects Windows versions from Win98 to WinXP.
    3) Virtual PC and WINE running under Linux do not use the Microsoft Graphics Rendering Engine.
    4) Even if they did, a Windows program trying to run in a Linux environment is a fish out of water, and can't do much besides SEGFAULT and exit.
    5) Therefore, Linux (and Mac) users are safe, even if they are running IE or Office - just like the article said.

  • Re:MOD PARENT UP (Score:1, Informative)

    by Anonymous Coward on Friday December 30, 2005 @11:26AM (#14364712)
    Yes, let's compare IIS to Apache.

    IIS6 has had 2 vulnerabilities since it's inception three years ago. The most serious of which could allow someone to DOS the webserver.

    http://secunia.com/product/1438/ [secunia.com]

    Apache has had 29 vulnerabilities, 27 within the same timeframe as the IIS6 comparison. The worst of which allowed for full system access.

    http://secunia.com/product/73/ [secunia.com]

    If you want to step back in time, IIS5 had 13 vulnerabilities and IIS4 had 6. Apache 1.3.x had 17.

    IIS seems less secure because of a handful of very public exploits, all of which happened typically months after the necessary patch was released.

    It's not the underlying product, it's the accessability and maturity of the tools available for compromise. In the case of Windows there are a great number of kits already assembled and ready to go that simply need an attack vector. Once a single buffer overflow is discovered people can insert their favorite malware code into the exploit and fire away.

    It's also mindset. Sitting back and claiming that Apache is invincible is the mindset that leads to compromise. Overconfidence often leads to complacency in both architecture and administration. I've run both IIS and Apache servers for close to a decade. I treat both like people are just waiting to get in and muck things up and in that time I've never had a single compromise. Nimda and CodeRed bounced right off.
  • by cortana ( 588495 ) <sam@[ ]ots.org.uk ['rob' in gap]> on Friday December 30, 2005 @11:36AM (#14364774) Homepage
    The last time there were flaws in zlib and libpng, security was an apt-get upgrade away. Compare that to Windows where most software seems to have its own private copy of those DLLs.

    Microsoft released patches for the libpng that came with Windows, along with a tool that scanned your hard drive, looking for copies of libpng embedded in third party executables and libraries. Unfortunatly, it would basically only say: "you {have,have not} installed Microsoft's patch for this issue; furthermore you have third party programs on your system, please install any updates available from your vendors". I can't remember a single program that released an update merely to fix the libpng flaw; in all probability every Windows machine with some kind of third party software on it probably still has dozens of copies of libpng and zlib lurking around on it.

    Your latter points are interesting. What you are describing is a mandatory access control security scheme, like the one implemented by SELinux [nsa.gov]. This has yet to catch on because it's bloody complicated--and I believe SELinux only restricts what an application can do based on the 'tag' that its executable recieves; I don't know if SELinux policies can grant permissions to a process based on the shared library that is executing at any one time, or even how SELinux policies interact with interpreters like sh, perl, python, and so on.
  • by Kurt Gray ( 935 ) on Friday December 30, 2005 @11:37AM (#14364777) Homepage Journal
    Didn't Microsoft already release a patch for this on Nov 8th? According to Symantec's info page [symantec.com] on this attack directs you to this Microsoft bulletin [microsoft.com] links to patches for each Windows release.
  • by NullProg ( 70833 ) on Friday December 30, 2005 @11:59AM (#14364933) Homepage Journal
    The real lesson is of course that once again mr buffer overflow strikes (don't implement anything in C if it needs to be secure). This time it's on windows.

    This isn't a buffer overflow, its a design flaw that allows metafiles to register callbacks with GDI32. And I fail to see what language a programmer uses has anything to do with it. Bad programmers are bad programmers reguardless of the language used. To the CPU its all instructions, it doesn't care if its issued by the crt or the java_vm.

    Enjoy,
  • Re:Firefox? (Score:2, Informative)

    by BaltikaTroika ( 809862 ) on Friday December 30, 2005 @12:02PM (#14364958)
    From TFA:

    "Because the vulnerability exists within a faulty Windows component, security experts warn that Windows users who eschew Internet Explorer in favor of alternative Web browsers, such as older versions of Firefox and Opera, can still get their PCs infected if they agree to download a file from a site taking advantage of the flaw."

    Baltika

  • by Tomaaah ( 939551 ) on Friday December 30, 2005 @12:15PM (#14365046)
    I believe you can be "infected" by the wmf-borne issue, but for it to then download and install the malicious code without notfying you first is an IE thing..?
  • by ergo98 ( 9391 ) on Friday December 30, 2005 @12:22PM (#14365090) Homepage Journal
    It's a misfeature of Windows itself. If you surf with ANY browser, you'll get zapped if you surf to a site set up to take advantage of this latest hole.

    This is completely untrue. BTW: I've visited many of the sites in question using a virtual session, so I know first hand.

    Internet Explorer uses the broken DLL in question to help it rendering the inline WMF in a webpage. Thus, if the site has a WMF as an image, IE can be exploited immediately. On Windows 2003 Server, it should be mentioned, WMFs are blocked by default (because it requires an external renderer, and IE disallows external helpers outside of trusted sites, or by explicitly allowing it with the security bar on a case-by-case basis).

    Mozilla/Firefox doesn't render or handle WMF at all. It'll ask you if you want to open the file, encouraging (at least in current versions) you to open it with Media Player. Even if you click OK you're okay, as Media Player won't know what to do with the file.

    Opera is in between - if it sees a WMF it will ask if you want to open it, and it'll suggest the Windows Picture and Fax viewer (which uses the affected DLL), so one OK later and you're owned.
  • by bushidocoder ( 550265 ) on Friday December 30, 2005 @12:43PM (#14365243) Homepage
    Not to be nitpicky, but the graphics rendering engine is not entirely in the kernel on 2000/XP/2003. Most of it is in the Win32 subsystem which runs in userspace.

    The graphics rendering engine is divided between the Win32 subsystem which is a user process (csrss.exe), and the Win32 executive (Win32.sys) which actually runs in kernel space. The portion of the graphics system in the executive is limitted almost exclusively to the actual displaying of images and direct interaction with the drivers that interface with the display hardware. I'm not 100% sure, but I can't ever recall there being a vulnerability found in this part of the executive.

    This specific vulnerability, like almost all image processing vulnerabilities, occurs in the image format parser, which is in the Win32 subsystem. As such its not in the kernel and runs in standard user scope. I know this doesn't change the point you were trying to make, which was the vulnerability doesn't occur on other systems. I just wanted to correct the statement about it being a kernel vulnerability.

  • by Frank T. Lofaro Jr. ( 142215 ) on Friday December 30, 2005 @12:57PM (#14365334) Homepage
    Games should not be doing the kind of things that need Administrator privilege to do!

    They have no business doing that, people without Admininstrator should be able to play, anything running as Administrator (or in that group) can do great damage (e.g. virus infections, file deletion, even destroy the BIOS), and doing things that require Administrator wrongly can also trash the system (accidently corrupting a DLL, locking up hardware, etc).

    There is a RunAs on Windows, and it is useful for doing sys admin stuff only when needed. It would be nice if it could be configured that a browser run by Administrator (lets say to need to Google for a solution to a problem you are working on) would drop privs (but even Linux doesn't do that).

    But my main point is games and other user programs should need Administrator.
  • by pete-classic ( 75983 ) <hutnick@gmail.com> on Friday December 30, 2005 @01:11PM (#14365427) Homepage Journal
    A more useful link [microsoft.com].

    -Peter
  • by $RANDOMLUSER ( 804576 ) on Friday December 30, 2005 @01:23PM (#14365489)
    I agree with all of that. Hell, I still tend to think of it as gdi.exe, which is about the last time I cared what Windows internals really looked like. But this "bug" is even better than that - it's not in the image format parser, it's in the freakin' WMF API!!! Believe it or not, WMF files are allowed to have callback functions (user or kernel mode unknown by me) in them - in other words a (picture) data file can contain executable code to "help" Windows display it!! <drools, whaps forehead> It gets better: change the file extension to "jgp" or "gif" or another image type, hell, probably any file type that has a custom icon/is previewable, and Windows will look at the file and go "oh - that's really a WMF file - I know what to do..." (I'm dyin' here). Even Windows Explorer (with thumbnails enabled) will execute the code if you look at a directory that contains one of these files.

    If there ever was a smoking-gun lead-pipe indictment of Microsoft's sloppy love of whizzo features, security, stability, maintainability, administerability be damned; this has GOT to be it. If the filetype API is that flawed, we need to just get rid of .WMF files, period.

  • Re:RootKit Revealer (Score:2, Informative)

    by GigsVT ( 208848 ) * on Friday December 30, 2005 @01:59PM (#14365752) Journal
    It's still scanning for known techniques.

    chkrootkit is the same way, it has some generic heuristics like the /proc process list not matching up with what ps returns.

    A new rootkit that doesn't rely on any old techniques wouldn't show up.
  • by Cyberax ( 705495 ) on Friday December 30, 2005 @02:00PM (#14365757)
    That's because Windows understands structered storage format natively and owner application's GUID is stored as the first entry.
  • by EdMcMan ( 70171 ) <moo.slashdot2.z.edmcman@xoxy.net> on Friday December 30, 2005 @02:08PM (#14365801) Homepage Journal
    Here is some information on the WMF threats [f-secure.com].
  • by jasen666 ( 88727 ) on Friday December 30, 2005 @02:29PM (#14365936)
    Same as IE. It's in the way Windows processes and displays this type of image file, so it doesn't matter what program is displaying the image.
    At least in Firefox, you will get a prompt asking you to run the script before it executes. So as long as you always remember to click on "Hell NO", you should be pretty safe.
  • by bushidocoder ( 550265 ) on Friday December 30, 2005 @02:45PM (#14366042) Homepage
    Actually, there's a fantastic book about the Windows internals called Microsoft Windows Internals, Fourth Edition [amazon.com] by Mark Russinovich. Every Windows programmer should have this book. Even if your work is entirely in .NET, its important to know why some of the decisions in .NET were made as they were, and its also vitally important to know exactly how Windows handles process security.
  • Re:MOD PARENT UP (Score:3, Informative)

    by Johnno74 ( 252399 ) on Friday December 30, 2005 @04:39PM (#14366805)
    If you enable the option on windows explorer "start each folder window in a new process" then you can then use the "runas" trick to start an explorer (NOT internet explorer) window that is running as admin.
  • I've said it before (Score:3, Informative)

    by WhiteWolf666 ( 145211 ) <{sherwin} {at} {amiran.us}> on Friday December 30, 2005 @05:18PM (#14367067) Homepage Journal
    I'll say it again.

    Use Windows. Get Infected.

    It's not restricted to unpatched Windows 98. It affects fully patched Windows XP SP2 running fully updated anti-virus.

    Use Windows, and you'll Get Infected.

    A firewall will protect you sometimes. Safe browsing will protect you other times. But in the end, something will get you. WMF, or a buffer overflow in IE, a spoofing vulnerability involving Windows Update, a Windows only Firefox bug.

    use Windows. Get Infected. Period.
  • by Kye-U ( 942325 ) on Friday December 30, 2005 @07:25PM (#14367747) Homepage
    Please read: http://kyeu.info/proxo/forums/viewtopic.php?t=699 [kyeu.info] I have created a filter that would kill any WMF-Exploit file, regardless of file extension. This is due to a new matching method I've discovered in Proxomitron, where it matches the magic bytes of known exploit files. Most people don't know Proxomitron can serve as a workaround to this issue. In my opinion, it serves the same protection as an antivirus in this case, as it's basically matching hex values and killing the connection upon a successful match.
  • by ilfak ( 935134 ) on Saturday December 31, 2005 @02:23AM (#14369139) Homepage
    After some hours looking at WMF file format I developed a fix for it:

    http://www.hexblog.com/ [hexblog.com]

    My fix works for Windows XP systems. I have tested it on my machines.

One way to make your old car run better is to look up the price of a new model.

Working...