It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by Dulcimer
I would not worry about this either.
ZDnet.com
The Internet Storm Center admitted that many businesses would be very reluctant to deploy an unofficial patch on their systems, but insisted that such drastic action is needed.
"We've received many emails from people saying that no-one in a corporate environment will find using an unofficial patch acceptable," said Tom Liston of the Internet Storm Center, in his blog. "Acceptable or not, folks, you have to trust someone in this situation."
One of the hidden dangers of the WMF vulnerability is that things are not always what they appear. Usually, WMF files can be identified by their windowsmetafile file extension, and blocked as a precaution, but attackers may choose to disguise malicious files simply by giving them another image file suffix, such as .JPG, because the Windows graphics rendering engine attempts to identify graphics files by their content, not their name. That was the case with a file with the title "happynewyear.jpg" that began circulating in e-mail messages on December 31: If opened on a Windows machine, the file attempts to download and install a backdoor called Bifrose.
Iain Thomson, vnunet.com:
"This is not really a bug, it's just bad design. When Windows Metafiles were designed in the late 1980s, a feature was included that allowed the image files to contain actual code," he said in a blog entry.
"This code would be executed via a call-back in special situations. This was not a bug; this was something which was needed at the time."
Hyppönen explained that the code was needed to stop print runs if they were cancelled mid-job. This means that other vulnerabilities in the WMF system are likely, and that every version of Windows is potentially affected.
4 paragraphs ... to include future removal instructions:
This safely and "dynamically patches" the vulnerable function in Windows to neuter it and, after rebooting, renders any Windows 2000, XP, 64-bit XP and 2003 systems completely invulnerable to exploitation of the Windows Metafile vulnerability.
Please Note: Unlike the "DLL unregister" recommendation offered by Microsoft (see RED box below) Ilfak's patch completely eliminates the vulnerability. Therefore, until Microsoft is able to update and repair their vulnerable GDI32.DLL, this is what you should use. You do NOT need to unregister the DLL as described in the RED box below.
You SHOULD REMOVE THIS PATCH to restore full functionality to Windows Metafile processing once WIndows has been officially updated and repaired.
To Remove: Simply open the Windows Control Panel "Add/Remove Programs", where you will find the "Windows WMF Metafile Vulnerability HotFix" listed. Remove it, then reboot.
Originally posted by Dulcimer
All I can say is surf smart. This is a case that you can avoid by staying on websites you trust.
Original Source:
Computer World
However, simply viewing the folder that contains the affected file, or even allowing the file to be indexed by desktop search utilities such as Google Desktop, can trigger its payload, F-Secure Chief Research Officer Mikko Hypponen wrote in his company's blog.
According to Ken Dunham, director of the rapid response team at iDefense, Windows machines running Windows Data Execution Prevention (DEP) software are at least safe from the WMF attacks seen so far. However, Microsoft said that software DEP offered no protection from the threat, although hardware DEP may help.
Originally posted by Dulcimer
The only thing I am worried about is browsing forums like ATS with tons of image linking, general linking to unknown content etc.
Your car has a huge number of vulnerabilities. Can it withstand a brick to the window? A knife to the tire? A particle beam accelerator? You people that expect Microsoft to anticipate every way someone might invent an attack in today's fast-paced technologically advancing world must be the same ones that think the world owes you a home, a job, and happiness. Go buy something better if you don't like it. What a dummy.
Originally posted by SkepticOverlord
Our forum server is altering the file name of any WMF files in posts, U2U's, and signatures into a harmless non-executing line of text.
Download Ilfak's WMF Vulnerability test from GRC — version 1.1, 3.6 kb (download link: www.grc.com... )
This is Ilfak's small and simple WMF vulnerability test program. It safely and benignly checks to see whether your system is currently vulnerable to the newly-discovered WMF vulnerability. It can be used to test your system's pre- and post-installation vulnerability with and without Ilfak's vulnerability suppression patch installed.
Source: www.grc.com...