Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Worms Security IT

New IM Worm Exploiting WMF Vulnerability 360

An anonymous reader writes "After less than a four days after original mailing list posting there are reports about a new Instant Messaging worm exploiting unpatched Windows Metafile vulnerability. This worm is using MSN to spread, reports Viruslist.com."
This discussion has been archived. No new comments can be posted.

New IM Worm Exploiting WMF Vulnerability

Comments Filter:
  • by IAAP ( 937607 ) on Sunday January 01, 2006 @02:03PM (#14374874)
    POP-UP windows!

    From MS' site: [microsoft.com] 4: Block pop-up windows in your browser

    My credit union requires that I allow pop-ups! I don't know how many times I've gone to legitimate websites and scratched my head for a while trying to figure out why I wasn't seeing anything - all because I'm blocking pop-ups! Firefox tells you with that little message on top of the window, but you know how it is, after a while, you don't notice it anymore.

  • Comment removed (Score:4, Interesting)

    by account_deleted ( 4530225 ) on Sunday January 01, 2006 @02:08PM (#14374897)
    Comment removed based on user account deletion
  • by jackb_guppy ( 204733 ) on Sunday January 01, 2006 @02:10PM (#14374906)
    IM is just a person private email system, period. Try using email, you can even use filters to pick your freinds messages out of the background noise, like inter-departmental mail.

    To fix the security risk of IM, either the you give up point to point email that it is to force it though filtering servers (sound like email there again). The Anti-Virus programs on every machine will have to start filtering all that traffic too (wait they are doing this for wmail today also!!)
    --
    When will people learn that NEW is not always GOOD.
  • Great.. (Score:3, Interesting)

    by wfberg ( 24378 ) on Sunday January 01, 2006 @02:12PM (#14374918)
    Microsoft recommends, for the time being to just

    regsvr32 -u %windir%\system32\shimgvw.dll

    BUT according to this analysis, the real fault lies with gdi32.dll ! How the hell do you get rid of that? It's about as deeply embedded in windows as, say, glibc is in Linux distributions..
  • Fearmongering (Score:4, Interesting)

    by eddy ( 18759 ) on Sunday January 01, 2006 @02:38PM (#14375036) Homepage Journal
    What we need now is for someone to find a remote exploit in a popular webserver and combine both exploits into a worm, 'cause then we're all really fucked.
  • by Anonymous Coward on Sunday January 01, 2006 @02:47PM (#14375071)
    but somebody can finish this joke... it has to do with a hacked Windows PC... I am teh lose today.

    "and on the 7th day 'after' Christmas my true-love gave to me"
  • by Spoing ( 152917 ) on Sunday January 01, 2006 @02:54PM (#14375104) Homepage
    If such a site were to exist, people would start catching on that it's all Microsoft's fault in the first place. Then people *would* switch to other systems.

    Nope.

    I've had conversations with regular non-techy people. They don't get it; they think that they are safe and/or don't want to think about the dangers or alternatives. Ever. It is not possible to convince them and if you point them to a technical site, they will ignore it. They must come to the decision by themselves after long years of abuse, if they drop Windows at all. That said, to my surprise, my brother in law decided to get a Mac Mini for his kids this Christmas. I gladly helped them configure it and bring over data from the old Windows box they (unfortunately) still use. I've given him that advice for about 5 years, and did not talk with him about it for the last 6 months...so whatever I've said or pointed out to him had very little to do with his decision. (My brother-N-L is a smart guy and does not ignore most other advice w/o good reasons.)

    Personally, I just refuse to help them to secure the Windows-based systems they chose to use unless it is a single-function server that I can configure how I see fit. I do reinforce with them just how hard it is to use Microsoft's products in a safe manner; 'exceedingly frustrating and still I'm unconvinced that it is secure when I'm done' is a phrase I use often.

    NOTE: I _DO_NOT_ subscribe to the idea that if you keep a system updated with the current patches, use a firewall, and be careful, it is safe to use. If that system is safe, it is more by luck and chance and not by your hard work. This exploit is a perfect example of how all those methods fall apart and can not be relied on.

  • by nacturation ( 646836 ) <nacturation&gmail,com> on Sunday January 01, 2006 @02:58PM (#14375120) Journal
    That's about as helpful as advising tsunami victims that they move.

    For those who want actual advice: http://www.hexblog.com/ [hexblog.com] -- a fix which creates a hook to disable the affected code. The fix has been analyzed by Steve Gibson. [grc.com]
     
  • by Animats ( 122034 ) on Sunday January 01, 2006 @03:06PM (#14375149) Homepage
    An exploit of "gdi32.dll" using a WMF file for the attack was documented back in November [securiteam.com]. Does this new exploit use the same attack approach?
  • Comment removed (Score:4, Interesting)

    by account_deleted ( 4530225 ) on Sunday January 01, 2006 @03:11PM (#14375172)
    Comment removed based on user account deletion
  • by tsa ( 15680 ) on Sunday January 01, 2006 @03:14PM (#14375185) Homepage
    My ISP regularly sends me emails about new MS vulnerabilities and what to do about them. I chuck them immediately because I use Windows only for playing games, but the fact that they send these mails means that a lot of Joe Sixpacks get to know about the dangers and can do something about it. I think that the main reason Joe Sixpack doesn't use non-MS software is that when something on a computer is more difficult than 'click here', 90% of the people doesn't even try. And another thing: people stick to what they know. That's very hard to change.
  • by YesIAmAScript ( 886271 ) on Sunday January 01, 2006 @04:02PM (#14375354)
    I can understand spreading the fact that the exploit exists. I could maybe argue whether or not you should spread info on the exploit. I can barely see why one would make an example exploit.

    But why would someone make a program specifically designed to make an undetectable/untraceable version of the exploit?

    I can only see harm coming from this.

    And I'm sorry, but "because it's there" doesn't work when you know there's only negative outcomes of what you do.
  • Re:so... (Score:3, Interesting)

    by Geoffreyerffoeg ( 729040 ) on Sunday January 01, 2006 @06:06PM (#14375771)
    Out of curiosity, where's the documentation that describes this? I was thinking of writing a WMF that pops up a window saying "Warning, you haven't patched the WMF vulnerability. I was able to open this window on your computer by simply loading a picture. Imagine if this had been a virus too. Click here to download the fix - and here's why you should trust that guy."
  • by (-hrair-) ( 942503 ) <hrair@outgun.com> on Sunday January 01, 2006 @07:32PM (#14376123)
    completely agreed. it also shows something of a lack of effort on microsoft's part. i believe that the problem has still not been fixed with an official patch (others have to do the dirty work) and i think the vulnerability was known about four days ago! That is unheard of on open source systems because their creators aren't busy marketing the newest XBox game. I recommend gaim or naim (if you don't mind console) for the aim and everything. I hear Trillian is good but have not gotten around to trying it yet. I believe it is for windows, no? Probably has better protection against this stuff than MSN does though (that doesn't say too much...) (-hrair-)
  • by drachen ( 49779 ) on Sunday January 01, 2006 @08:50PM (#14376363)
    Apparently the attackers aren't awesome programmers because history has shown that the real danger comes after a sample exploit is made, not when the info becomes known.

    Apparently you fail to realize this was a 0-day exploit. That is, there were people already exploiting this flaw before anyone else found out about it. Because they didn't release their source code do you feel safer by this? So your argument that the attackers aren't "awesome programmers" is completely worthless because these attackers found and wrote the original exploit code to begin with. We don't know how long this flaw may have been used in the wild before this one was found. Some "awesome programmers" could've been using this flaw years ago to break into networks. Re-read my original reply.

    Now some people who happen to have analyzed that exploit figured out just exactly how seriously this flaw is and what could be done with it if it's not fixed.

    A simple explanation is plenty.

    So you're saying that if all the attackers have is a simple explanation that they wouldn't be able to write code based upon that explanation? Yeah right. The people who wrote these sample exploits didn't even have that to begin with and look at what they've been able to come up with. The people ("attackers") who wrote the originally known exploit didn't need a simple explanation either.

    So now virus scan writers and IDS maintainers, etc, now have a LOT more information for how to defend against this particular threat. A simple explanation isn't sufficient. Now scanners and IDS can use these discovered methods to improve detection and prevention of exploitation of this flaw.

    Again, I just don't see why someone would need to make the most evil version of this possible and distribute the source code.

    Well, I can't explain it any clearer. You're using the "security through obscurity" argument that history has shown to be insufficient for protecting our computers and networks.

  • Re:so... (Score:2, Interesting)

    by borderpatrol ( 942564 ) on Sunday January 01, 2006 @09:33PM (#14376485)
    Older versions of FF will open it natively. (pre 1.0 I believe) Newer versions of FF and Opera will pull it up but will ask if you'd like to open the image with MS Picture and Fax viewer or whatever associated program. If you click no, you should be safe. If you click yes, you're infected. If this thing gets stored on you HDD or your cache somewhere though, the mere act of single clicking on the file or even the folder in some cases can trigger it. And if you have Google Desktop Search installed, google will index and execute the code as soon as it hits the drive. Some DOS boxes are getting infected this way even.
  • by Anonymous Coward on Sunday January 01, 2006 @11:36PM (#14376781)
    If i rename a malicious .WMF as a .JPG, and display it as an <IMG> on a website, will IE execute the WMF, or will the JPG just not work?

    JPG, PNG, GIF etc. all have headers that should surely be checked before displaying the picture. Do IE not do this?

    In short, do i have to actively click a "Open this file" dialog on the browser?

  • by ltbarcly ( 398259 ) on Monday January 02, 2006 @01:09PM (#14379094)
    their Q/A is probably the most intensive that any software company has on the planet

    A bunch of automated tests for one piece of software will prevent bugs which effect *functionality*. They cannot find bugs|vulnerabilities which are the result of poor design.

    And as for MS making good software, Windows does not even come with a plain text editor which can handle UNIX line termination! Notepad shits all over it, and Wordpad is NOT a reasonable editor to edit source or shell script code. EVERY OTHER text editor in the world, from nano, vim, joe, emacs, the OSX text editor, even fucking DOS edit can handle Unix line termination properly.

    MS's goal is to prevent interoperability with any other OS, and within their OS prevent the creation of software which can run on more than one platform. Beyond that they fail in everything.

Nothing is finished until the paperwork is done.

Working...