WMF Zero-Day Exploit

Straight_ManStraight_Man Geeky, in my own wayNaples, FL Icrontian
edited January 2006 in Science & Tech
There is a flaw in the way that Winodws XP (SP1 AND SP2) handles WMF files. This flaw is unpatched and being used widely now. Here's some links:

The links are from SANS Institute, a VERY respectable source.

Here's Microsoft's Security Bulletin link: http://www.microsoft.com/technet/security/advisory/912840.mspx

If there are questions I will reply in this thread.

Comments

  • edited January 2006
    Don't anybody ignore this one. Even though most everyone probably has never seen a file with a .wmf extension, the filetype means nothing with a carefully crafted metafile as the rendering program looks at the file data (header and such) and NOT the file type. So these exploits can masquerade as .jpg or .gifs or whatever.

    Microsoft's work-around has you de-registering the shimgvw.dll. While this may help reduce the chance of getting bit, it doesn't do anything for the real problem. That dll calls gdi32.dll which has an Escape() functionality in it through a SetAbortproc function and there in lies the ability to execute whatever code they want with full priviledges.

    I saw some infestations around Dec 28th that looked like spyware/malware symptoms without any real data trails as to what they were. Systems were unuseable after the desktop loaded and even saw a DSL router refuse to talk to the ISP. Quick and dirty fixes were a restore to a checkpoint and immediately start watching the security sites ( like those listed above by Straight_Man )

    Since the exploit code was published on the web ( and is still easy to find ) anyone interested can start playing with trying to compromise a machine. The sophisticated out there will use their executable code to execute a downloader which will go out and retrieve a trojan or keylogger or a zombie program or who knows what. The novice out there will probably just trash your machine.

    Microsoft says it is now testing a patch/fix and will release on the 10th of January. There is an 'unofficial' patch that works and works well by Ilfak Guilfanov. Look for links to it through above sites as his site became unuseable due to the many hits. They have mirrored it at many security sites.

    Be very very careful out there as all it takes is to open a folder with an infected file in it or if an indexing program reads the file the code will execute. If that image file is part of a web page your brilliant Windows OS will indeed execute the imbedded code.

    Standard practice of staying off questionable sites and not opening unsolicited attachments apply as usual, but be aware that a trusted site that has been compromised can get you.
  • NosferatuNosferatu Arizona
    edited January 2006
    I spent over an hour of manual labor tonight cleaning my girlfriends roommates computer of spyware and trojans. She said she has no idea how it became infected, but it was within the last 24 hours so it very well could have originally come from the WMF vulnerability. However, the main infection was something called SpyAxe (a very malicious/corrupt anti-spyware program), it was a royal pain in the ass to clean off the computer. I have a feeling it was installed when someone saw a fake popup claiming they were infected and then downloaded the malicious SpyAxe program trying to fix the fake-infection.

    Needless to say I also checked windows update for security updates and installed the 3rd party WMF fix. I also installed Firefox 1.5, SpyBot S&D as well as AdAware Personal and told her to not use Kazaa anymore as it's pretty easy to become infected from it. I don't think it will be long until the computer is screwed up again though with everyone in the house using that computer, lol.

    The WMF vulnerability is definitely NOT one you want to take lightly. I'd say this is the most serious flaws in recent times because it affects so many people, regardless if you are behind a router or are patched up to date, have a firewall, anti-virus, etc. My advice to everyone is to use the 3rd party WMF patch immediately and if you have a processor that supports it (like the AMD64 ones): enable full DEP protection (Control Panel > System > Advanced > Performance > Settings > Data Execution Prevention).
  • GHoosdumGHoosdum Icrontian
    edited January 2006
    Doesn't the no-execute protection only work in 64-bit mode?

    Also, Microsoft has promised a patch for this on Tuesday the 10th. Seems a little slow if you ask me...
  • shwaipshwaip bluffin' with my muffin Icrontian
    edited January 2006
  • edited January 2006
    Whoa !!

    7 days for a Microsoft fix ???

    They may have the word security erased from their dictionaries but they sure understood the severity of the 'feature' they left in that dll.
  • NosferatuNosferatu Arizona
    edited January 2006
    GHoosdum wrote:
    Doesn't the no-execute protection only work in 64-bit mode?

    Also, Microsoft has promised a patch for this on Tuesday the 10th. Seems a little slow if you ask me...

    I'm not sure, I run XP x64 Edition and didn't have any issues enabling full DEP protection. Can anyone confirm that DEP requires x64 + 64-bit CPU w/ NX?
  • ShortyShorty Manchester, UK Icrontian
    edited January 2006
    DEP works on my standard 32bit Xeons @ work with a 32bit install of Windows 2003 SP1.
  • GHoosdumGHoosdum Icrontian
    edited January 2006
    I'm pretty sure I'm wrong, I thought I heard that somewhere but the person I heard it from was probably wrong. ;)
  • Straight_ManStraight_Man Geeky, in my own way Naples, FL Icrontian
    edited January 2006
    GHoosdum wrote:
    I'm pretty sure I'm wrong, I thought I heard that somewhere but the person I heard it from was probably wrong. ;)

    That patch WAS scheduled for Tuesday the 10th with two other Criticals-- however, SANS efforts, law enforcement efforts (law enforcement computers were getting infected), and strong customer demand led to the emergency release. All computers that have been on today that have automatic update on should HAVE the patch now.
Sign In or Register to comment.