Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Internet Explorer Microsoft Operating Systems Software The Internet Windows

Oops! Missed One Fix — Windows Attacks Under Way 292

CWmike writes "Microsoft says attackers are now exploiting a critical Windows bug that it didn't get around to fixing in its biggest batch of security patches in more than five years, issued yesterday. Microsoft said that 'limited and targeted' attacks are in progress by hackers exploiting an unpatched vulnerability in the WordPad Text Converter, a tool included with all versions of Windows. If Microsoft patches the WordPad problem on its monthly schedule, the first opportunity for fixing the flaw would be Jan. 9, 2009." Update: 12/10 22:28 GMT by T : OK, there might have been more than one: reader Simon (S2) writes "There is an even more serious flaw ... From SANS: 'There is a 0-day exploit for Internet Explorer circulating in the wild. At this point in time it does not appear to be wildly used, but as the code is publicly available we can expect that this will happen very soon. This is a brand new exploit that is *not* patched with MS08-073 that was released yesterday. I can confirm that the exploit works in a fully patched Windows XP machine. The exploit is a typical heap overflow that appears to be exploiting something in the XML parser.'"
This discussion has been archived. No new comments can be posted.

Oops! Missed One Fix — Windows Attacks Under Way

Comments Filter:
  • by Shados ( 741919 ) on Wednesday December 10, 2008 @04:39PM (#26065451)

    From the article (i know I know, slashdot...), Windows XP SP3, Vista, and Windows Server 2008 aren't vulnerable. I didn't read how the exploit actually works to see if it can realistically be used to attack Windows Server 2003 (which is quite popular), but for people at home, if your machine is up to date, you're fine.

    So seriously, whats the big deal?

  • by V!NCENT ( 1105021 ) on Wednesday December 10, 2008 @04:41PM (#26065481)

    How can code in the wordpad text editor leave a machine vulnerable?

    It can be used to execute a malicious program that makes the system vulnerable. Wordpad just works as a launcher for the malicious program.

  • by Anthony_Cargile ( 1336739 ) on Wednesday December 10, 2008 @04:43PM (#26065501) Homepage
    Surely not a remote exploit, must be some sort of password retrieval (siw.exe) or something used to compromise a network or else it would not be so "critical". Now would be a good time to peek at the leaked Windows NT code from 2004...
  • by Java Pimp ( 98454 ) on Wednesday December 10, 2008 @04:44PM (#26065531) Homepage

    Send a specially crafted word document (i.e. code embedded) and trick the user into opening it with WordPad (i.e. using the .wri file extension).

  • by Shados ( 741919 ) on Wednesday December 10, 2008 @04:45PM (#26065545)

    Its not remotely exploitable. From the article, a user has to open a maliciously crafted file. So its just the fairly typical exploit where a document viewer poorly handles documents it can open.

    It needs user interaction to work, someone has to open a file that they don't trust (I guess it MAY be possible to trick a user into opening the file from the web, since there is a Word viewer that potentially use the same file converter that is responsible for the exploit).

    Also, XP SP3, Vista and WinServer 2008 aren't vulnerable at all.

  • by show me altoids ( 1183399 ) on Wednesday December 10, 2008 @04:45PM (#26065547)
    It has to trick the user into opening a Word 97 file with Wordpad, which can be done by changing the extension of the file to .wri. So as long as you don't open any attachments to bogus email, you'll be OK. This information is in the article, BTW.
  • by Anonymous Coward on Wednesday December 10, 2008 @04:46PM (#26065583)

    The attacker sends you a .wri file in an email. By default this will be opened using WordPad. WordPad will attempt to decode the Word97 content of the .wri file and in doing so will trigger some sort of attack code (the article and security advisory are vague about this part).

    Basically, don't open weird files that you find on the internet.

  • by AGSHender ( 696890 ) on Wednesday December 10, 2008 @04:50PM (#26065629) Homepage

    Well, considering that like many businesses that rely on specialized pieces of software to function (mine in particular being a law firm), we have held off on deploying both XP SP3 and not even put thought into Vista because our document management software and change-tracking/metadata scrubbing software are incompatible with anything above XP SP2 for the moment.

    We can't keep entirely up to date because it breaks the software my firm relies on, and replacing them isn't an option. From my experience at the law firms I've worked at, they move at one of two speeds: slowly or not at all.

  • by Java Pimp ( 98454 ) on Wednesday December 10, 2008 @04:51PM (#26065645) Homepage

    Word files are not binary executables. They are (pre OOXML) binary file formats. I don't know what the exact exploit is (probably some sort of buffer overflow) but the idea is to craft a Word document such that it contains executable code and exploits the flaw in wordpad that causes the executable code to execute.

  • by arootbeer ( 808234 ) on Wednesday December 10, 2008 @04:52PM (#26065661)

    I can only wonder how wordpad of all programs can allow this over some self-made app that does the same thing?

    It's easier to get someone to open a .wri or .doc file than a .exe file.

  • by Surreal Puppet ( 1408635 ) on Wednesday December 10, 2008 @04:52PM (#26065663) Journal

    This type of bug relies on "glitches" in the memory management (simplifying it a bit...) of the program, not on any high-level misses in the actual mechanisms of the code. Any program written in a programming language without automatic memory management can be exploited in this way, if the programmer "misses his step" somewhere. They can also be devilishly hard to find, because data can be structured and handled in memory in very complex and abstract ways.

  • by nathan.fulton ( 1160807 ) on Wednesday December 10, 2008 @04:57PM (#26065735) Journal
    When you're running everything as root, everything can be exploitable. And it looks like this is a character set or file format converter, which is considerably more than simple typing and copy/paste (the extend.) From the Security Focus [securityfocus.com] page (disucssion tab), it looks like it could be a buffer overflow ("prone to a remote code-execution vulnerability because of...corrupted memory.")

    The info page shows that it does indeed affect Server 2003, one of the more populat versions out there, as noted by another comment
  • by Anonymous Coward on Wednesday December 10, 2008 @04:57PM (#26065749)

    Like the 'Bush hid the facts' bug?

  • by dedazo ( 737510 ) on Wednesday December 10, 2008 @05:04PM (#26065841) Journal

    so when executed by Wordpad

    Wordpad does not have the capability to execute those macros, because it does not have an embedded VBA interpreter. The macros are binary gibberish without the VBA runtime, much like a Perl file is just text without the Perl interpreter.

  • by Shados ( 741919 ) on Wednesday December 10, 2008 @05:12PM (#26065953)

    If you have servers that old that you can't upgrade, thats fine (I mean, Win2k Server is still supported until 2010 I think? So thats fair).

    Just be careful about what you do while you're logged in (as you always should on a server anyway). I agree it IS unacceptable for something like this to happen on a supported OS, but my original post merely pointed out that its not like everyone will get hacked by doing nothing tomorrow. It only affects 2 versions of Windows if you're up to date, and only if you touch a malicious file. The people using these 2 versions still probably know what they're doing (I don't think grandma is using WinServer 2003)

  • by Real1tyCzech ( 997498 ) on Wednesday December 10, 2008 @05:14PM (#26065989)

    Control Panel - Folder Options - File Types - WRI - Edit - Open - Change to Microsoft Word.

    Problem solved.

    Next!

  • by Shados ( 741919 ) on Wednesday December 10, 2008 @05:30PM (#26066197)

    No. Someone has to click an attachment called "biggest breasts ever.wri" while, at the SAME TIME, running a non-updated version of Windows, Windows 2000, or Windows Server 2003. You reduce your attack vector by a significant amount here.

  • by moderatorrater ( 1095745 ) on Wednesday December 10, 2008 @05:38PM (#26066347)
    They've been doing this for over a year now at least. It's the greatest weakness in patch tuesday and shows how monopolies are often caught between a rock and a hard place. Corporations demand a set cycle for patches, but if you do that then the attackers can optimize their attacks so that they arrive one month from when the next patches come out. It's a lose-lose situation for them.
  • Re:WordPad? (Score:3, Informative)

    by Madball ( 1319269 ) on Wednesday December 10, 2008 @05:47PM (#26066471)

    Actually it's .wri files, which haven't been savable in Windows since 3.1.

    You can rename or Save As to whatever.wri in any version of Windows.
    Inferring from the content of the advisory at http://www.microsoft.com/technet/security/advisory/960906.mspx [microsoft.com] , the extension and format really doesn't matter, except to the extent you can get Wordpad to open the file. It would also work with a .doc extension, but only if you don't have Word installed (which is not vulnerable). To broaden the susceptible audience, .wri will likely be used an attack because it is always associated to the flawed program (Wordpad), assuming you haven't changed that behavior.

  • by Ilgaz ( 86384 ) on Wednesday December 10, 2008 @06:06PM (#26066707) Homepage

    I'd recommend Abiword for "Wordpad" fans.http://www.abisource.com/download/ , it is not a "build from source" thing, it is tiny and comes with a installer. Of course, it is a full feature Word processor, not a crippled "Write".

    MS figured people happily uses Write for their everyday stuff and even offices so they crippled it and shipped "Wordpad", the naming itself is like "This is like Notepad, use real Word for writing things".

    Just install all of the plugins package, it does open and even save them.

  • by RenderSeven ( 938535 ) on Wednesday December 10, 2008 @06:07PM (#26066725)
    MS Notepad never gets issues either because it and your other examples are plain text editors. WordPad has all sorts of MS Word functionality built into it so you can view Word documents if you dont have Word installed. Problem is that Word has been (relatively) well shaken out but WordPad has not, since, hey its only WordPad so who gives a cripe.

    The vulnerability is using WordPad to convert an infected Word document, by getting the user to open an infected attachment. Anyone stupid enough to get infected this way deserves everything Darwin can throw their way.
  • by eggnet ( 75425 ) on Wednesday December 10, 2008 @06:12PM (#26066771)

    TextEdit can read and write word docs too. It supports rich text.

  • by Shados ( 741919 ) on Wednesday December 10, 2008 @06:17PM (#26066853)

    If you have an MSDN Subscription and are a developer, thats actually your best bet (well, now its Windows Server 2008, which is superior in every way, but...)

    Windows Server editions have been better desktops than their actual "home" or "professional" editions for a while. The only drawback is they are harder to setup initially (2003 and 2008 are fairly locked down by default), and that they have higher hardware requirements (but use the hardware better). Oh, and the price, of course (but if you use it for development purpose, you can use the MSDN version. Even without that, its expensive, but its not 10 grands either)

    Add that some stuff only works on Windows Server (let say, Sharepoint), and unless you feel like running Windows XP or Vista, only to spend 99% of your time in a VM, Windows Server is a vastly superior option.

  • by Ilgaz ( 86384 ) on Wednesday December 10, 2008 @06:25PM (#26066933) Homepage

    They don't have such chance to make it non vulnerable unless they scrap entire backwards compatibility.

    A more mad solution would be the thing Apple did. Run the older OS in a virtual machine in its own thread (trublue, MacOS Classic support).

    MS can't take such big decisions so, anything claimed for Windows 7 is a joke. If one can run Wordpad from XP in Windows 7, it is not secure.

  • by quantum bit ( 225091 ) on Wednesday December 10, 2008 @06:29PM (#26066993) Journal

    Yeah, but it changes them to DOS format when you save, with no option to keep the UNIX line endings :(

    Good thing vim has a windows version.

  • Re:Fedora bug .. (Score:4, Informative)

    by Entropius ( 188861 ) on Wednesday December 10, 2008 @07:11PM (#26067439)

    That's a lot more userfriendly than Windows.

    Linux: "There's a problem. If you're technically able, here is a fix."

    Windows: "There is a problem. You're boned, sorry."

  • by darkpixel2k ( 623900 ) on Wednesday December 10, 2008 @07:54PM (#26067901)

    Oh please. Wordpad is like Notepad, only it can't make up its mind whether to be richtext or plaintext and it doesn't open files when you drop them into it.

    Don't drop the files into the 'document area', drop them onto the 'menu bar' area and they'll open.

    I f*cking hate wordpad, but it's the only thing that recognizes and saves unix line-endings and is installed on every windows box since the beginning of time.

  • by Sun.Jedi ( 1280674 ) on Wednesday December 10, 2008 @08:07PM (#26068053) Journal

    Mods. Please. Look it up [wikipedia.org].

    This must be mod-fucktard day.

  • by K. S. Kyosuke ( 729550 ) on Thursday December 11, 2008 @12:54AM (#26070859)
    Just read this [wikipedia.org]...

The one day you'd sell your soul for something, souls are a glut.

Working...