Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

ALERT UPDATE - WMF flaw can't wait for Microsoft fix, researchers say

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU
 
Terre Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 11:54 AM
Original message
ALERT UPDATE - WMF flaw can't wait for Microsoft fix, researchers say
Edited on Wed Jan-04-06 12:05 PM by Terre
Because this a very serious threat to the well-being of your Windows OS computer (no other OS is vunerable), I'm updating from my original post of two days ago. This post supercedes that one.

Hat tip to Radio_Lady for posting information from this new article in the old thread:
WMF flaw can't wait for Microsoft fix, researchers say
By Peter Sayer, Paris | Wednesday, 4 January, 2006

Users of the Windows OS should install an unofficial security patch now, without waiting for Microsoft to make its move, advise security researchers at The SANS Institute's Internet Storm Center (ISC). Their recommendation follows a new wave of attacks on a flaw in the way versions of Windows from 98 through XP handle malicious files in the WMF (Windows Metafile) format. One such attack arrives in an email message entitled "happy new year," bearing a malicious file attachment called "HappyNewYear.jpg" that is really a disguised WMF file, security research companies including iDefense and F-Secure say. Even though the file is labelled as a JPEG, Windows recognises the content as a WMF and attempts to execute the code it contains.

Microsoft advised on 28 December that to exploit a WMF vulnerability by email, "customers would have to be persuaded to click on a link within a malicious email or open an attachment that exploited the vulnerability."

However, simply viewing the folder that contains the affected file, or even allowing the file to be indexed by desktop search utilities such as the Google Desktop, can trigger its payload, F-Secure's Chief Research Officer Mikko Hypponen writes in the company's blog. In addition, source code for a new exploit was widely available on the internet by Saturday, allowing the creation of new attacks with varied payloads.The file "HappyNewYear.jpg," for example, attempts to download the Bifrose backdoor, researchers say.

(snip)

Alarmed by the magnitude of the threat, staff at the ISC worked over the weekend to validate and improve an unofficial patch developed by Ilfak Guilfanov to fix the WMF problem, according to an entry in the Handler's Diary, a running commentary on major IT security problems on the ISC web site. "We have very carefully scrutinised this patch. It does only what is advertised, it is reversible, and, in our opinion, it is both safe and effective," Tom Liston writes in the diary. "You cannot wait for the official MS patch, you cannot block this one at the border, and you cannot leave your systems unprotected," Liston writes.


I encourage you to read the entire article.

Next, READ & BOOKMARK (check daily as well) the continuing updated information from:
Steve Gibson/Gibson Research Corporation (GRC)

You can access the downloadable hotfix patch and checker from links provided on Steve's website. Please read the top notice he provides AND the Breaking News at a minimum.

Please RECOMMEND so that the greatest number of DU'ers can have access to this information.

Microsoft is not expected to release their "official patch" until January 10th at the earliest, HOWEVER, it may be longer than that.

Please don't leave your Windows computer vunerable when you don't have to.

Lastly, please tell your family and friends to take this simple precaution. The download is a simple 284kb file and can be removed easily (when the time comes), using your Windows Add/Remove Program.
Printer Friendly | Permalink |  | Top
wtmusic Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 11:58 AM
Response to Original message
1. What does it take to get people to bail on Microsoft altogether
I'm amazed that anyone still uses that crap.
Printer Friendly | Permalink |  | Top
 
Terre Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:03 PM
Response to Reply #1
3. It's gonna take next to forever
I'm afraid, and there are many reasons for it.

In the meantime, since the OS is in widespread use, we still need to be on our toes, even if MS isn't.

I'm just thankful that there are experts out there that DO CARE.
Printer Friendly | Permalink |  | Top
 
Sapphire Blue Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:47 PM
Response to Reply #3
59. Not forever... Microsoft’s goal is to release the update on Jan 10th
Microsoft Security Advisory (912840)
Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution.

Published: December 28, 2005 | Updated: January 3, 2006

On Tuesday, December 27, 2005, Microsoft became aware of public reports of malicious attacks on some customers involving a previously unknown security vulnerability in the Windows Meta File (WMF) code area in the Windows platform.

Upon learning of the attacks, Microsoft mobilized under its Software Security Incident Response Process (SSIRP) to analyze the attack, assess its scope, define an engineering plan, and determine the appropriate guidance for customers, as well as to engage with anti-virus partners and law enforcement.

Microsoft confirmed the technical details of the attack on December 28, 2005 and immediately began developing a security update for the WMF vulnerability on an expedited track.

Microsoft has completed development of the security update for the vulnerability. The security update is now being localized and tested to ensure quality and application compatibility. Microsoft’s goal is to release the update on Tuesday, January 10, 2006, as part of its monthly release of security bulletins. This release is predicated on successful completion of quality testing.

Continued @ http://www.microsoft.com/technet/security/advisory/912840.mspx


WMF vulnerability – no official patch yet
ByKonstantin Kornakov | Jan 04 2006 16:48 GMT

Microsoft has responded to the identification of the WMF vulnerability by promising to release a patch on January 10th The patch will be released as part of the scheduled monthly release of security bulletins. At the moment it is being localised and quality tested.

Microsoft itself claims that monitoring of the vulnerability shows that attacks are not widespread and limited in scope. At the same time, the lack of an official patch has opened a window of opportunity for malicious users to exploit. It has been reported that there are now dozens of attacks being carried out, ranging from an MSN worm to spam containing links to malicious websites. One suggestion is that at least a million PCs worldwide have already been affected. It has also been claimed that up to 99% of computers worldwide could be vulnerable to this security flaw.

One indication of the seriousness of the situation is the advice given by some security professionals to install an unofficial Windows patch created by computer expert Ilfak Guilfanov. This is unusual, and those who recommend installing Guilfanov's patch stress that installing third party patches from untrusted sources is highly unwise. Microsoft itself advises against installing third-party add-ons as the company cannot guarantee functionality. However, the only alternative advice Microsoft can offer is to keep antivirus signature files updated, and to sit tight until the official patch is released next week.

http://www.viruslist.com/en/news?id=177161379

Printer Friendly | Permalink |  | Top
 
Terre Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:58 PM
Response to Reply #59
60. LOL - No, I meant that ...
it would take forever for people to move from the Windows OSystem to others OS's less vunerable to exploits.  :)

However, even waiting another 6 days (at a minimum) is still *forever* in terms of getting MS to hustle.
Printer Friendly | Permalink |  | Top
 
Sapphire Blue Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 02:47 PM
Response to Reply #60
65. Well, of course you did.
I would have realized that, had I taken the time to actually read through this thread (and your post) in context, instead of skimming through it!

Yes, 6 days (minimum) can seem like forever in terms of getting MS to hustle. Meanwhile experts in the field provide solutions. *sigh*
Printer Friendly | Permalink |  | Top
 
Beelzebud Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:05 PM
Response to Reply #1
5. When Linux and Mac support the large number of apps/games.
Until that happens Linux will be a nerd's toy, and Macs will be used by professionals that have money to burn on a closed system.

Printer Friendly | Permalink |  | Top
 
bpilgrim Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:38 PM
Response to Reply #5
26. sourceforge.net (tons FREE of software) & a macmini costs $500
Printer Friendly | Permalink |  | Top
 
Beelzebud Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:43 PM
Response to Reply #26
29. LOL You have got to be joking...
sourceforge is ok, but please. It doesn't have the quality of software that is retail. Some things are better, but freeware games suck, and most freeware apps do to.

And the minimac... My friggin videocard is more powerful. No thanks...
Printer Friendly | Permalink |  | Top
 
bpilgrim Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:00 PM
Response to Reply #29
38. no - there are plenty of quality open source programs
i know i work with them daily and many blow away anything on windows especially enterprise class apps i.e. Apache which powers most of the websites you visit like DU.

Check out this link for some powerful FREE client apps as well...
http://www.opensourcemac.org

the mac mini is a great starter computer if you wanna play games get a play station.

peace
Printer Friendly | Permalink |  | Top
 
Beelzebud Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:06 PM
Response to Reply #38
40. LOL. You telling me what type of computer to use and what to play
games on, is not going to convert me to Linux or Mac.

It's just going to make me roll my eyes, and utter profanities under my breath, about elitist mac/linux users.

My PC does everything I want it to. It plays games a playstation coudln't even attempt to run. I build maps for Unreal Engine games. Can't run UnrealEd 3.0 on Linux, Mac, or a playstation.

Thats really cool Apache is open source, but for just having a PC to use, that isn't something I need AT ALL. I don't host any webpages.

I have plenty of open source software. I use what works better. I use Firefox for my browser because it does more. I use Windows for my OS because it does more. Period. I've tried Linux and unless you are a total nerd, it's not something to use. Having to recompile a kernel to do something like change a video card is not something a sane person wants to mess with.

Please. Just stop trying to tell me what I should use, or what I should play games on. I'll be the fucking judge of that.
Printer Friendly | Permalink |  | Top
 
bpilgrim Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:34 PM
Response to Reply #40
56. i'm just countering some myths is all
use whatever you want, just keep your facts straight ;->

http://XvsXP.com

psst... pass the word :hi:

peace
Printer Friendly | Permalink |  | Top
 
Feron Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:32 PM
Response to Reply #38
55. I agree that there are many excellent freeware programs..
However most people don't have the luxury of buying an entirely new system. Why buy a mac mini as a starter computer when you already have one? Not to mention that many people already have $$$ invested in software for Windows and some of it doesn't have a freeware/Mac equivalent.


And as somebody pointed out on a Unix board, Linux is like a free puppy. ;)

I'm planning to put Linux back on my computer and dual boot ,but I don't think the unnerdy population wants to deal with things like software dependencies.

BTW even on my Linux box I will have things like a rootkit checker installed. Even though Mac and Linux are better coded for security than Windows, there is no operating system immune to malware.
Printer Friendly | Permalink |  | Top
 
bpilgrim Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:43 PM
Response to Reply #55
58. "Why buy a mac mini as a starter computer when you already have one?"
because you won't have to spend all your time scrambling to keep your work safe.

not to mention that OS X client & server got voted best OS for 2006 at infoworld
http://www.infoworld.com/article/06/01/02/01FEtoyos_1.html?s=feature

more info...
http://XvsXP.com

peace
Printer Friendly | Permalink |  | Top
 
MetaTrope Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 08:17 AM
Response to Reply #58
113. And a pretty good way to avoid pregnancy
is to live in a convent.
Printer Friendly | Permalink |  | Top
 
klook Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:43 PM
Response to Reply #5
57. "professionals that have money to burn on a closed system" HA!
I switched to Mac after years of Windows usage because I was sick of all the maintenance problems and required upgrades--not because I'm a pro who needs Mac OS, or a snob who's willing to spend extra $$ to somehow feel "superior" to Windows users. (And no, I am not employed with Apple or any of their affiliates, so this is not an advertisement.)

My personal time is worth a lot to me, so much so that I will spend some extra money up front so that I don't have to spend tens of hours every year recovering from crashes, updating DLLs, trying to restore lost files, etc. And I don't want to have to buy a bunch of auxiliary applications to keep my system running smoothly. In the 21st century, why should millions of people have to use a computer that doesn't function as promised, and become a self-service tech support geek in the process?

For years I kept using Windows systems even though they continued to bite me in the ass over and over, because I thought I couldn't afford to replace all the applications I'd bought, and the initial purchase price of a Mac was higher. I even installed Linux on a partition so I could recover files when Windows crashed (saved my bacon a couple of times). But Linux, although it had the potential to give me complete control over my machine, had a steep learning curve and was only partially plug-and-play (at least the version I was using, Red Hat 9).

Three things led me to switch to Apple/Mac:
1) I saw what a great product that iPod was and thought, "If they can do this, I bet their computers are pretty good, too."
2) I looked at a couple of issues of MacWorld magazine. Unlike the PC mags, there were very few articles about disaster recovery, virus removal, modifying the registry, installing bug fixes, updating device drivers, etc. "What a refreshing concept," I thought. "A computer magazine that's just about how you can use the computer to do cool stuff!"
3) I learned that Mac OS X is built on a Unix backbone. From my experiences with Linux (which, as I guess most readers know, is an open-source variant of Unix), I knew what stable operating systems the *nix environments provide.

Also, when I discovered how much great software is included with a Mac, the cost comparison looked a whole lot better.

FYI, If you want more info on why Windows systems are really more vulnerable to viruses, check out this article\.
Printer Friendly | Permalink |  | Top
 
wtmusic Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 04:49 PM
Response to Reply #57
73. thanks...couldn't have said it better nt
Printer Friendly | Permalink |  | Top
 
Beelzebud Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 07:36 PM
Response to Reply #57
97. For someone that felt the need to state that you don't work for Apple
Your post reads like something from Apple's advertising and marketing division...
Printer Friendly | Permalink |  | Top
 
klook Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 09:46 PM
Response to Reply #97
104. Um...
Well, when a product is good I figure it doesn't hurt to say so. Are you taking this personally? That's sure as hell not my intent. Because I find most Mac zealots as irritating as you probably do (and Windows and Linux zealots are just as bad). I mean, it's just a damn machine. A tool. If it works for you, fine. If it doesn't, use a different one.
Printer Friendly | Permalink |  | Top
 
skids Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 04:19 PM
Response to Reply #5
71. Games are the keystone.
I know a lot of gamers that won't come over to the light side of the force simply because gaming companies give Linux the short shrift. (For that matter, even when they support other OSes, they also give non-i386 architectures the short shrift, despite the fact that i386 has by far the most inferior SIMD units on the market, and has been completely definicient in SIMD for a decade now.)

Gamers tend to be slightly more technically literate, and much of the free technical support that people get for MS comes from people they know who have their elbows greasy from working on technical issues with games, and building their own gaming dream box. As long as those people stay in MS-land, MS will continue to reap the benefit of a voluntary support group rivaling OpenSource's.

And no, OpenSource games won't do it. If it's going to change it has to come from the professional gaming companies.

Fortunately for me, Tribes2 and UT are about all I need to stay amused and both run on Linux. Occasionally I'll opt for StarCraft, but that does fine under WINE. The rest of my gaming is all console based -- which by the way may be the industry that spells the death of i386 in the longterm, what with the non-xbox console folks outrunning i386 this year by miles in terms of performance.



Printer Friendly | Permalink |  | Top
 
EvolveOrConvolve Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 02:23 AM
Response to Reply #71
108. That's absolutely wrong
The gaming community could move to PS2, XBox 360, or a Linux/Mac computer tomorrow and Microsoft wouldn't care one bit. They make the lion's share of their money from business sales, and home users are simply a little extra cream in Bill Gates' saucer. It's not a coincidence that XP Home is an utter piece of shit OS, or that Microsoft broke into the gaming market with the XBox. The gaming community, while a significant chunk of the home consumer market, is dwarfed by the sheer mass of the business market. Interestingly, Microsoft's monopoly on the business market is far less than it is in the home/small office market.

Gaming companies do what all other companies do - they release a product and hope to make a profit on it. If 90% of the PC gaming market is running Windows, the gaming companies will release games for Windows. Releasing games for all the different OS's, many of which have insignificant market share, is not a smart business move for most companies, especially because many games have to be stripped down and rewritten for each different OS. Many games available on Linux are "hacked" versions that are recompiled by 3rd parties, and amount to little more than warez bullshit.

I've had Windows 2000 running in my office since 2001, and I've never had a crash, a blue screen of death, or any hardware issues. In fact, my machines only get powered down about every six months, and even that's usually due to outside forces like power outages or electrical storms. To say that the Windows OS is any worse than any other OS is simply specious. I spend far less time managing my Windows OS than I did when I ran a Linux system. Less headaches, less stress, and more time for productivity. It was a no-brainer.
Printer Friendly | Permalink |  | Top
 
skids Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 05:26 PM
Response to Reply #108
117. You miss the point.
We were talking specifically about the home user base, not about Gate's bottom line -- I doubt many business IT departments come to Democratic Underground for their tech advice. So your comment is beside the damn point. And, my experience with Windows and Linux in both environments has been quite the opposite of yours -- even having the tools and knowlege to keep the Windows boxen I have run in the past from becoming infected, there were still stability problems and in addition, bugs in the operating system cost me over a workweek worth of Visio documents -- work which I had explicitly saved to disk but did not get saved as advertised. As I used applications not maintained by the desktop group, I had to do so myself, and I know first hand what a beast it is to maintain.

I've been using Linux since 0.92 and Windows since 3.1 (not so much these days, though.) Linux is in all ways superior when it comes to stability and maintainability. Only software companies hold it back by keeping the frill that users crave in Windows-only apps.


Printer Friendly | Permalink |  | Top
 
Singular73 Donating Member (999 posts) Send PM | Profile | Ignore Wed Jan-04-06 12:06 PM
Response to Reply #1
7. If everyone used Linux,
Then people would attempt to exploit Linux Backdoors.

Don't be naive.
Printer Friendly | Permalink |  | Top
 
rman Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:36 PM
Response to Reply #7
23. Linux is harder to exploit because it is not closed source.
But i suppose you knew that already.
Printer Friendly | Permalink |  | Top
 
CornField Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:37 PM
Response to Reply #1
25. For some of us, it is a requirement
I have clients who use MS. The files they give me are MS files which cannot be opened, manipulated or whatever by non-MS applications. So, I run two machines -- a personal and a business. My personal machine is Linux and the one I use for business is MS. When I upgraded computers this last time, I looked at moving to Mac. (After all, I'm an old newspaper person and, therefore, a Mac lover. LOL!) It came down to the bottom line. I could buy a Mac with all the bells and whistles I needed, but I couldn't afford to replace all my MS-based software.
Printer Friendly | Permalink |  | Top
 
wtmusic Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 04:53 PM
Response to Reply #25
76. What apps are you using? nt
Printer Friendly | Permalink |  | Top
 
Xenotime Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:17 PM
Response to Reply #1
47. What OS do you use?
Printer Friendly | Permalink |  | Top
 
wtmusic Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 04:50 PM
Response to Reply #47
74. mac OSX nt
Printer Friendly | Permalink |  | Top
 
tridim Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 03:59 PM
Response to Reply #1
67. Software availability
I run the OS that runs my software. I don't run an OS because I think it's superior, as I'm well aware that all OS's have security problems. They just aren't exploited as much because they aren't as popular as Windows.
Printer Friendly | Permalink |  | Top
 
wtmusic Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 04:52 PM
Response to Reply #67
75. are you a gamer?
that's the only reason I can think of to stick to Windows. There are very few business apps that aren't also available for Mac, or that someone doesn't make a better equivalent
Printer Friendly | Permalink |  | Top
 
tridim Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 06:25 PM
Response to Reply #75
92. No, I'm a 3D and video artist
I use 3D Studio Max, Cakewalk Sonar and Sony Vegas exclusively. I chose them because they're the cream of the crop, and they happen to only run on Windows.

If they ran on Linux I'd switch in a heartbeat. I'll never own a Mac because I can't stand closed hardware. I prefer to build my own boxes to achieve the maximum cost/performance ratio.
Printer Friendly | Permalink |  | Top
 
WLKjr Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 08:51 PM
Response to Reply #1
102. I can tell you what it will take
A Linux/Unix core with a windows look/feel/ease of use. One that you don't have to be a super geek (or feel like one) to navigate the OS.
Printer Friendly | Permalink |  | Top
 
Brundle_Fly Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 03:42 AM
Response to Reply #1
109. exactly
I covet my mac.
Printer Friendly | Permalink |  | Top
 
Tace Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:00 PM
Response to Original message
2. That's Odd -- Both Links In Your Post Take Me To Microsoft.com
Yet, when I check the properties, they show a different address. I dunno'
Printer Friendly | Permalink |  | Top
 
Terre Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:06 PM
Response to Reply #2
6. Just fixed my links
Try it again.
Printer Friendly | Permalink |  | Top
 
Beelzebud Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:04 PM
Response to Original message
4. This is not something to panic about...
I'm waiting for the official MS fix. Who knows what some 3rd party fix is really doing. Hell, for all I know that patch could 'make' me vulnerable...

Smart PC usage will keep you safe from this. Don't open files from websites you don't trust, and don't open email attachments from ppl you don't know.

The sky is not falling.

And to the person saying he doesn't know why ppl don't dump this crap: When Linux or Mac supports the large number of games and apps that windows does, I'll consider it. But right now I'm sticking with windows. Linux is only good for harcore computer nerds, and Mac is only good for musicians and email readers.

Printer Friendly | Permalink |  | Top
 
DemNoir Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:08 PM
Response to Reply #4
8. This is indeed very serious
Edited on Wed Jan-04-06 12:13 PM by DemNoir
A WMF file could be hidden in any link.A place like ummmm DU for instance that allows users to post links to pics; just viewing a thread could infect you. This exploit allows anything to be loaded on a PC.
Printer Friendly | Permalink |  | Top
 
sybylla Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 06:12 PM
Response to Reply #8
89. I don't need no stinking patches. At least not unoffical ones
In Netscape, I can edit preferences under privacy and security to adjust what images will load in the browser as well as e-mail. It's a temporary fix and doesn't require that I install any software or specious patches.

For the next 6 days, I get to decide exactly what images will be loaded/opened on my computer. Then I get the offical patch.
Printer Friendly | Permalink |  | Top
 
Terre Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 07:29 PM
Response to Reply #89
96. Make sure you set your folder options
in Windows Explorer (on the off-chance you look around in there) to not show the thumbnail images as well. File and File folder names are sufficient.
Printer Friendly | Permalink |  | Top
 
Terre Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:10 PM
Response to Reply #4
9. The choice, of course, is yours
Edited on Wed Jan-04-06 12:11 PM by Terre
I won't go into the numerous reasons you should trust me, or anyone else for that matter. If you want to put your faith and trust only in Microsoft, that's absolutely your right to do so.

I, for one, am not willing to take the chance.
Printer Friendly | Permalink |  | Top
 
FlaGranny Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:12 PM
Response to Reply #4
10. You know, someone, eventually
Edited on Wed Jan-04-06 12:13 PM by FlaGranny
will decide to really go after Linux and Mac just for their users' "superiority." If I were the kind of person to do such a thing, that's just what I'd do.
Printer Friendly | Permalink |  | Top
 
DemNoir Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:16 PM
Response to Reply #10
12. That is true to some degree
But Windows because of some aspects of it's design is far easier to exploit than
Linux or OSX.
Printer Friendly | Permalink |  | Top
 
FlaGranny Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:22 PM
Response to Reply #12
51. Yeah, I know, but
I'm really surprised it hasn't been done - or has it? ;-)
Printer Friendly | Permalink |  | Top
 
jsamuel Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:18 PM
Response to Reply #4
13. That is the problem with this one, YOU ARE WRONG
Edited on Wed Jan-04-06 12:20 PM by jsamuel
simply "not opening files from websites you don't trust" and "email attachments" will not protect you with this bug. Simply viewing a webpage can do it for this one. It is a very atypical threat. I would download and install the 3rd party and have. You can uninstall it when the official one comes out.

For example, say someone here posts an image that contains a virus, YOU ARE INFECTED AS SOON AS YOU OPEN THEIR THREAD.
Printer Friendly | Permalink |  | Top
 
quiet.american Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:28 PM
Response to Reply #13
18. This is what happened to me.
I'm usually very careful, but I ended up viewing a webpage that self-installed this crap when I closed out of the page. I've tried everything to get rid of it, but it seems to re-install itself everytime I re-boot.

This garbage is contained in a folder called on my hard drive called "eosc." The file is called "ruth.exe." Everything I've used that indicates it will be deleted permanently has failed. This thing shows up everytime I re-boot my computer. I've downloaded the recommended unofficial patch, but haven't seen a difference.

Printer Friendly | Permalink |  | Top
 
jsamuel Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:30 PM
Response to Reply #18
19. that is because the patch helps prevent a virus
It will not stop the virus once it is already on your machine. :(
Printer Friendly | Permalink |  | Top
 
quiet.american Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:27 PM
Response to Reply #19
53. Thanks. n/t
Printer Friendly | Permalink |  | Top
 
Oreo Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:34 PM
Response to Reply #18
22. Are you using XP?
Turn off System Restore by right clicking on My Cmoputer and going to properties. I battled the same issues until I realized it was Windows and not the virus that was redoing the files.
Printer Friendly | Permalink |  | Top
 
quiet.american Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:28 PM
Response to Reply #22
54. Alright! I'll try that as soon as I can. Cheers. n/t
Printer Friendly | Permalink |  | Top
 
quiet.american Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 09:05 PM
Response to Reply #22
103. At last. That worked. Thanks again for the "prompt." n/t
Printer Friendly | Permalink |  | Top
 
Oreo Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 09:35 AM
Response to Reply #103
114. Cool... System Restore is a terrible thing
Leave it to MS to add something that restores viruses after they've been deleted.
Glad it worked!
Printer Friendly | Permalink |  | Top
 
Renew Deal Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 04:26 PM
Response to Reply #13
72. Also previewing pictures can infect the machine.
This is assuming someone can exploit this hole.
Printer Friendly | Permalink |  | Top
 
phusion Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:21 PM
Response to Reply #4
15. having spent some time in the computer security field
I know that SANS is the authority on a lot of this stuff. I would personally trust them over Microsoft any day.

Printer Friendly | Permalink |  | Top
 
Xenotime Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:20 PM
Response to Reply #4
50. And to the person who doesn't trust 3rd party fixes...
hasn't done all the research. The source of the patch has been posted and viewed by many in the industry.
Printer Friendly | Permalink |  | Top
 
Garbo 2004 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 05:29 PM
Response to Reply #4
83. The 3rd party fix has been publicly scrutinized by loads of security
specialists. F-Secure, a reputable AV company, has put the fix on its own computers and recommends others do so as well. SANS, a reputable IT security outfit also recommends the patch.

Basically the unofficial patch from a noted programmer has had more public scrutiny, in terms of outside people taking it apart to see what it is and does, than the proprietary MS patches you download. (And I recall MS patches that have borked PC's but few people think twice about checking to see if there are reports of any problems before downloading a MS patch.)

And since it's been documented by SANS that a trusted website had an exploit put on it that did deliver the malware by simply browsing the site, safe practices alone are not a guarantee of safety. Just for an example.

It's not a matter of "panic" but providing information. People then they can make informed choices as to what steps to take, if any. Do as you like but you apparently are not fully informed about the exploit or possible means of infection.
Printer Friendly | Permalink |  | Top
 
LibertyorDeath Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:16 PM
Response to Original message
11. Thank You !!
Gibson is 100% trustworthy
and one of the best out there.

Patch Your Systems People!

http://www.grc.com/sn/notes-020.htm

Thanks Terre !
Printer Friendly | Permalink |  | Top
 
Terre Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:24 PM
Response to Reply #11
16. And THANK YOU
and to those that recommended. At least I can rest a little easier that people like me, who start off DU from the Greatest Page, will get the chance to see this.
Printer Friendly | Permalink |  | Top
 
Occulus Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:20 PM
Response to Original message
14. Can eminent domain be used to appropriate this OS for the public?
Yup, I'm serious. Can we use the eminent domain provisions in the Constitution to force the source code into public hands?

It is time for Micro$oft to go bye-bye. As a corporation, they ought not have a "right" to "their" property; the public ought to be able to simply take it.

And: it's not stealing if we legislate it so. We, The People, can write and pass any damn law we please, and, as a corporation, Micro$oft should get no say in the matter.
Printer Friendly | Permalink |  | Top
 
Terre Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:28 PM
Response to Reply #14
17. I don't know the answer to that question
but I do know that we need to concentrate our efforts in getting *Co out of office ASAP!
Printer Friendly | Permalink |  | Top
 
Hyernel Donating Member (665 posts) Send PM | Profile | Ignore Wed Jan-04-06 12:33 PM
Response to Original message
20. Petting my shiny new G5 Dualcore Powermac...
...That's a healthy girl!
Printer Friendly | Permalink |  | Top
 
leeroysphitz Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:34 PM
Response to Original message
21. The sky is NOT falling lets do some research...
According to SYMANTEC makers of Norton anti-virus:

Microsoft Windows Graphics Rendering Engine WMF SetAbortProc Code Execution Vulnerability

Risk
High

Date Discovered
12-28-2005

Description
Microsoft Windows WMF graphics rendering engine is affected by a remote code execution vulnerability. This issue affects the 'SetAbortProc' function.

The problem presents itself when a user views a malicious WMF formatted file, triggering the vulnerability when the engine attempts to parse the file.

The issue may be exploited remotely or by a local attacker. Any remote code execution that occurs will be with the privileges of the user viewing a malicious image. An attacker may gain SYSTEM privileges if an administrator views the malicious file.

Local code execution may facilitate a complete compromise.

Platforms Affected
Avaya DefinityOne Media Servers
Avaya IP600 Media Servers
Avaya S3400 Message Application Server
Avaya S8100 Media Servers

Components Affected
IBM Lotus Notes 6.5
IBM Lotus Notes 6.5.1
IBM Lotus Notes 6.5.2

Recommendations
Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.
Do not allow untrusted individuals to have local access to computers. This may limit exposure to local attack vectors.

Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy network intrusion detection systems to monitor all network traffic for signs of suspicious or anomalous activity. This may aid in detecting attempts to exploit latent vulnerabilities or in detecting malicious activity that occurs as a result of successful exploitation.

Do not accept or execute files from untrusted or unknown sources.
Users should not accept files from untrusted or unknown sources as they may be malicious in nature.

Do not follow links provided by unknown or untrusted sources.
Users should avoid Web sites of questionable integrity and not follow links supplied by unknown or untrusted sources.

Do not accept communications that originate from unknown or untrusted sources.
Disabling client support for HTML email may limit exposure to this attack vector.


Implement multiple redundant layers of security.
As it may be possible that this issue will be leveraged to execute code, memory protection schemes are recommended. Memory protection schemes such as non-executable stack/heap configurations and randomly mapped memory segments may complicate exploitation of memory corruption vulnerabilities.

Microsoft has released a security advisory (Microsoft Security Advisory (912840)) confirming this issue. The referenced advisory contains information about workarounds and the vendor plans to release updates in the near future. Please see the advisory for more information.

Microsoft plans to release updates to address this issue on Tuesday, January 10, 2006.

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] .


Just use due caution keep your head for five more days...
BTW to all the max/ Linux snobs jumping up and down for joy, if anyone actually USED your os's you'd have to contend with these issues from time to time as well there is nothing inherently more secure about EITHER platform.

http://securityresponse.symantec.com/avcenter/security/Content/16074.html
Printer Friendly | Permalink |  | Top
 
Beelzebud Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:36 PM
Response to Reply #21
24. Thanks. As I said. Smart PC usage will keep you free of this.
Printer Friendly | Permalink |  | Top
 
DemNoir Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:47 PM
Response to Reply #24
31. NO, it will not
Your wrong. For instance, do you check every link in a thread before viewing it?
simply viewing an image can infect your PC. You don't seem to understand this.

A place like DU that allows inline pics could easily be filled with this exploit.
Printer Friendly | Permalink |  | Top
 
Beelzebud Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:54 PM
Response to Reply #31
35. By who? Is this exploit that easy imbed in jpg's? How many ppl can do it
I mean really. Is it just common knowledge how to exploit this bug?

How many people know how to exploit it?

I know a lot of net users. No one I know has fallen victim to this virus.
Printer Friendly | Permalink |  | Top
 
DemNoir Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:03 PM
Response to Reply #35
39. Yeah ok
And everyone with a virus on there computer knows they have it.

This is not one specific virus, this can be used to load any type of file including rootkits.

Printer Friendly | Permalink |  | Top
 
Beelzebud Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:08 PM
Response to Reply #39
42. And again I ask. How many people know how to exploit it?
1, 5, 10, a million? I don't think it's that widespread.

It's fine to be safe and get the patch if you want, but I'll be waiting for the offical fix.
Printer Friendly | Permalink |  | Top
 
DemNoir Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:14 PM
Response to Reply #42
45. plenty
By now im sure that everyone that writes spyware knows how to use this. In fact if your explore the various Anti Virus sites you will see that this is one of the fastest spreading exploits in history.
Printer Friendly | Permalink |  | Top
 
Garbo 2004 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 05:38 PM
Response to Reply #42
84. There's a "research" site that posted what is in effect a "how to" on
the exploit. It's not a secret to folks who are into this thing. Even not particularly talented script kiddies can use it. It doesn't take millions of script kiddies for an exploit to be widely propagated.
Printer Friendly | Permalink |  | Top
 
serryjw Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 10:41 PM
Response to Reply #84
128. Help! Terre suggested I write
I may not be alone in this problem!



I have an
>unauthorized copy of win '98 so a patch is not a option. I am
>in no financial shape to install other OS and am too much of a
>weenie to try another. How can I minimize the threat? Thanks,
>Serry
Printer Friendly | Permalink |  | Top
 
Terre Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 10:48 PM
Response to Reply #128
129. I've decided to piece together some info
about what you can do for older Windows OS's, and post it in a new thread, instead of getting "lost" in this one.

I'll let you know when the post is up and provide a link. It may take awhile, so I hope you'll be patient.
Printer Friendly | Permalink |  | Top
 
serryjw Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 10:54 PM
Response to Reply #129
130. Thanks a bunch!
n/t
Printer Friendly | Permalink |  | Top
 
Garbo 2004 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 05:50 PM
Response to Reply #35
86. A .wmf can be disguised as a .jpg, .bmp, other graphic formats.
And yes, there are many folks now who do know how to exploit it.

The exploit is in effect a "dropper," it's esentially a means of entering and leaving malware on a PC. So there's not a specific "virus" that is in issue, with recognized symptoms. For example, if a keylogger is left on a PC, by nature it's a stealthy program and will not alert the user that something is amiss. AV's are trying to keep up with the variants of the exploit and some AV's are better than others at detection of the exploit and the various potential payloads dropped on PC's.

Printer Friendly | Permalink |  | Top
 
leeroysphitz Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 02:09 PM
Response to Reply #31
62. then why isn't it?
Freepers have at least a few semi-computer literate people.
Printer Friendly | Permalink |  | Top
 
Feron Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:11 PM
Response to Reply #24
44. I disagree.
Even savvy computer users can be hit by this. If you go to a site that has ads for example, the payload can still infect your computer that way even on a 'trusted' site. If you use IE, there is no warning something is executing.

From SANS:
It will execute just by viewing the image. In most cases, you don't have click anything. Even images stored on your system may cause the exploit to be triggered if it is indexed by some indexing software. Viewing a directory in Explorer with 'Icon size' images will cause the exploit to be triggered as well.

http://isc.sans.org/diary.php?storyid=994

One of the many online tests to see if you are vulnerable:

http://kyeu.info/WMF/

Since this is a new thread, the patch author is posting at Castlecops:

http://castlecops.com/f212-Hexblog.html

While the sky isn't falling, this is an extremely serious vulnerability and don't rely on your skills to extricate yourself from infection. The fact that every reputable source urges people to install the patch should tell you something.


Printer Friendly | Permalink |  | Top
 
DemNoir Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:42 PM
Response to Reply #21
28. Wrong again
This is by far the most serious PC threat ever. How many users could easily implement whats being suggested here, or even understand it.

What if you click on a DU thread and it contains malicious WMF file? This could easily happen.

NO user should take this lightly. It is very serious. Go to the GRC site discusssed in this thread and get the patch asap.
Printer Friendly | Permalink |  | Top
 
Terre Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:52 PM
Response to Reply #21
34. That Symantec advisory was issued 7 days ago
Edited on Wed Jan-04-06 12:53 PM by Terre
The problem presents itself when a user views a malicious WMF formatted file, triggering the vulnerability when the engine attempts to parse the file.


Explain to me HOW can a computer user would NOT VIEW an image file that is compromised if they've already landed on it as it begins it's download?

Like I've previously stated, you can take the chance if you want to, so I guess we'll have to agree to disagree.

edited: to make that 7 days (could even be 8 if you count the 28th)

Printer Friendly | Permalink |  | Top
 
leeroysphitz Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 02:07 PM
Response to Reply #34
61. I'll take my chances considering that the alternative is to
install unfamiliar software from an unfamiliar author recommended to me by unfamiliar people. Symantec has kept my machine running smoothly for YEARS.
Printer Friendly | Permalink |  | Top
 
Terre Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 02:20 PM
Response to Reply #61
64. More power to ya
if you think that Symantec can ward off every single new exploit of a Windows vunerability BEFORE it hits your computer.

I wish you the best of luck - Really, I do.
Printer Friendly | Permalink |  | Top
 
trotsky Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:40 PM
Response to Original message
27. Official Microsoft WORKAROUND
Click Start, Run, and type in the box:

regsvr32 -u %windir%\system32\shimgvw.dll

and click OK. This will un-register the system file responsible for parsing WMF files. As a result, you will disable your PC's ability to open them. BUT probably 90%+ of users won't miss it, AND when the official patch comes out, it will re-register the file and make everything work again.
Printer Friendly | Permalink |  | Top
 
DemNoir Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:44 PM
Response to Reply #27
30. Bad information
This patch has been shown to be insufficient days ago. Read the original post in this thread.
Printer Friendly | Permalink |  | Top
 
trotsky Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:50 PM
Response to Reply #30
32. Should be sufficient for most users, is what I heard.
Hard to get the straight story.
Printer Friendly | Permalink |  | Top
 
jsamuel Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:52 PM
Response to Reply #32
33. so far in my office, 90% of people have missed the dll
part of the problem is that the dll won't reregister properly on Windows 2000 so tifs don't show up in thumbnails anymore
Printer Friendly | Permalink |  | Top
 
Garbo 2004 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 05:54 PM
Response to Reply #32
87. It's not sufficient. If it were security folks wouldn't be so concerned.nt
Printer Friendly | Permalink |  | Top
 
LiberalAndProud Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:56 PM
Response to Original message
36. .
:kick:
Printer Friendly | Permalink |  | Top
 
troubleinwinter Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 12:58 PM
Response to Original message
37. Hotfix worked for me (XP), BUT
husband is running '98 and there is not a hotfix for that. So he tried two different versions of the 'workaround', and the computer says it can't find such a file, or it 'failed'.

What to do for an old '98????!!!
Printer Friendly | Permalink |  | Top
 
CornField Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:07 PM
Response to Reply #37
41. In the words of SANS, "This is a watershed moment"
There is no patch/fix and Microsoft isn't going to release one. It's probably time to upgrade.
Printer Friendly | Permalink |  | Top
 
Terre Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:25 PM
Response to Reply #41
52. I'm not so sure about that
because at the Microsoft website (under General Information/Overview) they DO include Windows98.

So I suggest questions should be posted over at the forum that I linked to in my post below (or above-lol), #43.

However, I will agree with you. If anyone is still running Windows98, it's time to seriously consider an upgrade.
Printer Friendly | Permalink |  | Top
 
Renew Deal Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 04:12 PM
Response to Reply #41
70. Microsoft will release a patch.
Edited on Wed Jan-04-06 04:13 PM by Bleachers7
They had much more strict QA than individuals. The Anti-Virus crowd has been able to deal with it so far.
Printer Friendly | Permalink |  | Top
 
Terre Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:11 PM
Response to Reply #37
43. Try asking over at the CastleCops
Hexblog, if no one here knows the answer. I know I don't. This forum was set up because Ilfak's blog was closed due to over-usage. It has grown considerably since yesterday:

http://castlecops.com/f212-Hexblog.html
Printer Friendly | Permalink |  | Top
 
troubleinwinter Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 02:12 PM
Response to Reply #43
63. Thanks. I did.
Followed a link there, and it seems that the workaround doesn't work on '98, but the NEWEST thinking is that '98 isn't effected by the problem anyway. Something about that they didn't have the same type of viewer that is in newer versions.

So there ya go. Mine has the fix, and it looks like the '98 is relatively in the clear.

Thanks all!
Printer Friendly | Permalink |  | Top
 
in_cog_ni_to Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:16 PM
Response to Original message
46. Will my Norton anti-virus protect me from this Or should I download the
fix?
Printer Friendly | Permalink |  | Top
 
DemNoir Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:18 PM
Response to Reply #46
48. Download the fix
AV programs will not help much with this.
Printer Friendly | Permalink |  | Top
 
in_cog_ni_to Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 01:19 PM
Response to Reply #48
49. OK...damn. Thanks. I hate computers.
BUT can't live without one!
Printer Friendly | Permalink |  | Top
 
ChairmanAgnostic Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 03:39 PM
Response to Original message
66. Tin foil Hat Time. What if . . . . .?
We know that NSA planted cookies unto all visitors to its site. WE know that the NSA has the best computing, programing and mathematical brains working for it. We know that Windows sucks. What if these flaws were created by the NSA to allow it easier access into our machines?
Printer Friendly | Permalink |  | Top
 
slackmaster Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 04:04 PM
Response to Original message
68. How about just not running any .wmf files until the smoke clears?
Is that asking too much of people?
Printer Friendly | Permalink |  | Top
 
Renew Deal Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 04:11 PM
Response to Reply #68
69. No can do
It affects all image files. Read the technical info.
Printer Friendly | Permalink |  | Top
 
Garbo 2004 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 05:00 PM
Response to Reply #68
77. It can be disguised as another graphic format...have any fear of .jpgs?
And then the OS in its wisdom recognizes it as a .wmf and runs it even if you just preview it.

If were as simple as simply filtering .wmf's there wouldn't be as much concern. Read up on the exploit if you want to know how it works and the various methods a vulnerable PC can be infected.
Printer Friendly | Permalink |  | Top
 
slackmaster Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 05:05 PM
Response to Reply #77
78. I don't view any files from unfamiliar sources, other than plain text
Safe Computing saves.

I've never been hit by any of the worms or viruses, with only one exception:

When I was a System Administrator at Andersen Consulting (a.k.a. The Borg) I got hit by a boot-sector infecter. I was scanning a suspected floppy with Norton AV in my office when the power to the whole building went out. As I was checking servers on another floor, the power came back on and my desktop machine booted from the floppy.

Thanks for the replies!
Printer Friendly | Permalink |  | Top
 
bpilgrim Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 05:11 PM
Response to Reply #78
79. see, even you were vulnerable, a system admin no less
computer users don't wan't a degree in CS to be able to play their DVDs or games.

peace
Printer Friendly | Permalink |  | Top
 
slackmaster Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 05:12 PM
Response to Reply #79
80. It's a tough world out there for most people
Edited on Wed Jan-04-06 05:13 PM by slackmaster
So many evil-minded fuckheads.

BTW the fix for my virus infestation consisted of booting from a good DIS 6.22 floppy and running two commands to rebuild the boot records of my HD. It took about 2 minutes to complete the repair.
Printer Friendly | Permalink |  | Top
 
bpilgrim Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 05:27 PM
Response to Reply #80
81. just be glad MicroSlop doesn't make cars
:evilgrin:

peace
Printer Friendly | Permalink |  | Top
 
Art_from_Ark Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 09:40 PM
Response to Reply #81
125. If MicroSlop did make cars, they'd be based on the Yugo
and people would be banging down their door to get one.
Printer Friendly | Permalink |  | Top
 
Oreo Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 05:28 PM
Response to Reply #78
82. The wmf's can be renamed to .jpg's and still infect
It's not as easy as blocking wmf files. The list of extensions is long and scary.

Printer Friendly | Permalink |  | Top
 
Garbo 2004 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 06:23 PM
Response to Reply #78
91. So you have graphics turned off while you browse? Do you browse in plain
text? The net is full of graphics from unfamiliar sources.

There was a strange thread here last night where a guy with a low post count (yeah I know that doesn't necessarily mean anything) was insisting that he found weird symbolism, stuff from New Year's pics and he'd enlarged them and encouraged folks to view him via links he posted. Rather odd. May have been nothing to it and he was just being a tad peculiar. But how many folks unthinkingly clicked on the links to see his pics?
Printer Friendly | Permalink |  | Top
 
Chalco Donating Member (817 posts) Send PM | Profile | Ignore Wed Jan-04-06 05:40 PM
Response to Original message
85. I downloaded the patch, now my computer doesn't work
So, buyer beware big time. I have to take my computer in to a repair shop tomorrow. I downloaded the patch from a website that you or the Washington Post recommended. Now my computer keeps turning off and on at will. I called SONY and they said there was nothing they could do because we weren't able to get it out of safe mode. Nothing. Now I have to go to system restore.

I am TOTALLY, COMPLETELY bummed out.

I'm on my husband's computer now.
Printer Friendly | Permalink |  | Top
 
Garbo 2004 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 06:03 PM
Response to Reply #85
88. Are you running XP SP1 or SP 2? If you're in safe mode, go into
Edited on Wed Jan-04-06 06:14 PM by Garbo 2004
Add or Remove Programs and delete the patch. Then reboot. See if that helps.
Printer Friendly | Permalink |  | Top
 
Chalco Donating Member (817 posts) Send PM | Profile | Ignore Wed Jan-04-06 08:47 PM
Response to Reply #88
100. The computer wont even go into safe mode.
It keeps trying to go there then shuts down and starts up again. Believe me, I am screwed. The tech guy at SONY was flabbergasted. We tried everything.

I went to CastleCops. They say: Oh it must be something else. That's everyone's line. I downloaded the patch and then was instructed to reboot. It started to reboot but couldn't finish and kept looping so I started the safe mode thing and it kept looping in and out of that.

Castlecops doesn't know what to do either.

Printer Friendly | Permalink |  | Top
 
Terre Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 07:52 PM
Response to Reply #85
98. I was going to refer you to CastleCops
but I see you've already been there and posted your question.

Before you take your computer to Sony, check the forum over there again, right before you disconnect it to leave for a restore. Someone else may have added additional information.

As Paul mentioned, it sounds like an issue unrelated to the patch. Regardless, I'm sorry this has happened to you.
Printer Friendly | Permalink |  | Top
 
Chalco Donating Member (817 posts) Send PM | Profile | Ignore Wed Jan-04-06 08:49 PM
Response to Reply #98
101. I don't see how it couldn't be the patch.
I can understand the patch not working, but to blow up my computer?
Printer Friendly | Permalink |  | Top
 
Terre Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 09:53 PM
Response to Reply #101
105. I really don't know what to say
I'm just so sorry you have to go through this.

I was going to write something else, got caught up with my son's homework, and went back to the CastleCops forum on the off-chance you got any other replies, which you did.

I suggest also, that you print out this page in its entirety:
http://www.hexblog.com/security/wmffix_faq.html

PLUS the portion (including the graphic) of the following page that that also explains, but in a bit more detail, what Ilfak's hotfix does. Second post from the top:
http://www.f-secure.com/weblog/archives/archive-122005.html#00000754

PLUS your forum discussion over at CastleCops.

Take this information along with you when you see the Sony tech tomorrow.


Printer Friendly | Permalink |  | Top
 
Chalco Donating Member (817 posts) Send PM | Profile | Ignore Thu Jan-05-06 07:47 AM
Response to Reply #105
112. Thanks, I'll report back! nt
Printer Friendly | Permalink |  | Top
 
Chalco Donating Member (817 posts) Send PM | Profile | Ignore Thu Jan-05-06 08:52 PM
Response to Reply #112
118. My computer guy said a virus got into my computer.
That's it. That's what he said. Don't know who to believe.
Printer Friendly | Permalink |  | Top
 
Terre Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 09:04 PM
Response to Reply #118
121. Did he say what kind of virus?
Did you ask him? And more importantly, is it fixed now?

I really seriously doubt it was the hotfix you installed. IMO, the way your computer was reacting doesn't at all sound like anything the exploits would have created. Also, if the hotfix were infected with a virus, we'd all be experiencing more or less the same thing as you did.

It was probably a different virus, unrelated to the WMF thing, that coincidentally, infected your computer.

Anyway, as I said, I hope your computer is on the mend. BTW, as Garbo posted below, MS has released their official patch. Uninstall Ilfak's hotfix from your other computer, and install MS's official one. And it doesn't matter in which order you do it.
Printer Friendly | Permalink |  | Top
 
Chalco Donating Member (817 posts) Send PM | Profile | Ignore Fri Jan-06-06 08:03 AM
Response to Reply #121
131. I assume that hotfix is gone isn't it.
The computer guy retrieved my documents and now is restoring the hard drive to its original state. So I don't need to uninstall the hotfix, correct?
Printer Friendly | Permalink |  | Top
 
sybylla Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 06:22 PM
Response to Original message
90. A temporary fix that some of you might find a bit more palatable
Consider a safer browser rather than a specious patch until the Microsoft "fix" comes out on the 10th.

For example, I have always used Netscape as my browser. In Netscape, and likely several other browsers, you can configure it to restrict or block the loading/opening of images from websites and e-mail.

You can get the latest version of Netscape free at www.netscape.com

If you're already using Netscape, click on edit(at the top of the window)/preferences/privacy and security/images. Then change how images load.

It's not likely a pretty fix, but if all this techie mumbo jumbo is giving you the willies, it's better than nothing.
Printer Friendly | Permalink |  | Top
 
OregonBlue Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 06:33 PM
Response to Original message
93. MY HUSBAND GOT IT AND HIS COMPUTER IS TOAST.
He does lots of business online and didn't take the precautions. I've spend 3 days trying to rebuild his computer. Even wiping the drive and reinstalling Windows XP Pro won't work. Get this hotfix NOW.
Printer Friendly | Permalink |  | Top
 
Garbo 2004 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 06:52 PM
Response to Original message
94. Two things for users who aren't interested in the patch: check AV settings
Edited on Wed Jan-04-06 07:12 PM by Garbo 2004
and consider having your AV scan all files, since 1. likely your AV by default is not set to scan .wmf files and 2. a .wmf file can be disguised as another format such as .jpg, .bmp, etc. The extension of the file isn't the key flag to a .wmf, since another extension can be used.

And, do not run in the administrator account mode on your PC. Run in a limited user mode. This does not in itself prevent infection, but may limit some of the amount of damage done if malware does get past your AV or other defenses.

A fellow I know of intentionally infected a test PC to document the process and posted his results here: http://www.linklogger.com/wmf_attack.htm It may be of interest to some to see how the malware payload downloaded by the exploit proceeded to turn off Windows Security Center and the Win firewall. As some folks say, if you're in Admin user's mode and you're infected, game's over.
Printer Friendly | Permalink |  | Top
 
Poiuyt Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 07:27 PM
Response to Original message
95. Question: How many engineers does it take for Microsoft to make decent
software?

Answer: More
Printer Friendly | Permalink |  | Top
 
Garbo 2004 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-04-06 07:55 PM
Response to Original message
99. NOD32 antivirus has released temp patch for W98 thru W2003 FWIW.
Paolo Monti of NOD32, Italy created it. He's done many standalone cleaners, etc in the past and made them freely available to others via ESET/NOD 32 site.

I may no claims for this patch as I haven't yet tried it, although I do use NOD 32 as my AV. For anyone interested: http://www.nod32.ch/en/download/tools.php

ESET USA site here: http://www.nod32.com/home/home.htm (And no I'm not telling folks to change AV's or use the patch, just providing info on a patch by a reputable AV company as an FYI and FWIW.)
Printer Friendly | Permalink |  | Top
 
LibertyorDeath Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 01:52 AM
Response to Original message
106. Kick for the night owls
Printer Friendly | Permalink |  | Top
 
flyarm Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 02:09 AM
Response to Original message
107. CAN ANYONE SPEAK ENGLISH TO A TOTALLY ILLITERATE
Edited on Thu Jan-05-06 02:10 AM by flyarm
COMPUTER PERSON

I DON'T UNDERSTAND ANY OF THIS MUMBO JUMBO..

i really don't..i have a pc windows xp...do i need to do any of this that i have no understanding of...

ifeel like i am reading a foreign language here...hot zip patch this that ..
how do i know if i am vunerable to what???????

ok ok..i told you i was illiterate to what is being talked about here..but i am sure there are others here that don't get what you are talking about...

and if not than i am the only computer dummy!!

thanks ahead of time..fly
Printer Friendly | Permalink |  | Top
 
Garbo 2004 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 04:51 AM
Response to Reply #107
110. How simple need it be? XP has a recently discovered weakness. It
Edited on Thu Jan-05-06 05:40 AM by Garbo 2004
can be exploited by malware (often called a "virus" athough that's not really accurate) by various methods, some as simple as viewing an image on a web page. Microsoft will not issue a patch to fix the problem until January 10.

Some noted computer security people are seriously concerned about this problem and the relative ease with which unprotected PC's can be infected. It's not clear how widely this malware has spread on the net to determine how likely it may be that people just surfing even on relatively safe sites can be infected. But the potential is there. (One needn't go to "bad sites" to be infected if a trusted site has been compromised. Or if you follow a link someone has malicously posted on a messageboard you trust, for example.)

A free unofficial patch has been created by a noted programmer/software developer to help protect MS XP systems until the MS patch comes out and is vouched for by many. Many people have downloaded and installed it without problem. A programmer for the NOD 32 antivirus program has also produced a free temporary unofficial patch as I noted above. But many people are wary of downloading a patch that is not from Microsoft, regardless of who produces it and who vouches for it.

Some Antivirus programs catch some but not all varieties of the malware that currently are in the wild. See post #94 for suggestions on antivirus programs' settings and about using a limited user account for everyday activities like surfing the web, reading email, etc. (a limited user account imits your ability to install software, unlike the administrative user account which allows for total control of the operating system). For info on limited user accounts, go into XP's Help and Support Center and type in "add limited user account" in the search window for info on the topic. Running in a limited user account is considered a good practice in general for security reasons. Many Windows users just run in an administrative account since it's easier to do things like install software without switching user accounts, but it's not the safest practice.

Here's an article from a mainstream not technical publication: http://www.msnbc.msn.com/id/10684853/

And really, the only way one remains a total "computer dummy" is by not taking any time and effort to learn some basics about the computer system one uses, especially in regards to security which with Windows systems is a significant concern unfortunately. Don't want to or don't have the time? Fine. Completely understandable. Lots of people don't want to or don't think they can, they just want to use their computer. For those I suggest they consider looking into getting a Mac the next time they're in the market for a new computer. Seriously. Apple has some computers that are relatively reasonably priced. And the Mac operating system is not as much of a target for the bad guys compared to Microsoft systems.
Printer Friendly | Permalink |  | Top
 
tiptoe Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 05:15 AM
Response to Original message
111. kick
Printer Friendly | Permalink |  | Top
 
Terre Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 09:38 AM
Response to Original message
115. Kicking
For the few hours this post has left on the Greatest Page, and a little visibility for a couple minutes (lol) in this forum.

:kick:
Printer Friendly | Permalink |  | Top
 
Garbo 2004 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 03:36 PM
Response to Original message
116. Microsoft will begin issuing its official patch TODAY, January 5.
Likely in response to demand from major business/gov't customers who wanted the official patch and didn't want to wait until next week. (Also it was a bit of bad PR that news of this exploit/vulerability was getting more public attention the same day Bill was publicly unveiling and bragging about Windows Vista, MS' new system coming out later this year.)

MS usually staggers release of its patch so it may not immediately show up in individual users' Auto Updates on their pc's. Depends how MS rolls out the patch.

Information from Microsoft's site here:

Important Information for Thursday 5 January 2006

Microsoft announced that it would release a security update to help protect customers from exploitations of a vulnerability in the Windows Meta File (WMF) area of code in the Windows operating system on Tuesday, January 2, 2006, in response to malicious and criminal attacks on computer users that were discovered last week.

Microsoft will release the update today on Thursday, January 5, 2006, earlier than planned. http://www.microsoft.com/technet/security/bulletin/advance.mspx

Printer Friendly | Permalink |  | Top
 
BuyingThyme Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 09:09 PM
Response to Reply #116
122. Mine has already updated automatically.
Printer Friendly | Permalink |  | Top
 
IDemo Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 09:00 PM
Response to Original message
119. The patch is available, I just downloaded it. n/t
Printer Friendly | Permalink |  | Top
 
SharonRB Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 09:02 PM
Response to Reply #119
120. Did you have any trouble after you downloaded it?
My hubby had all kinds of trouble. He gets automatic updates from Microsoft and when he installed the one he got today, it really screwed up the machine. He finally got it working right again after four reboots.
Printer Friendly | Permalink |  | Top
 
Terre Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 09:13 PM
Response to Reply #120
123. No trouble here
And I did an uninstall of the "unofficial" hotfix and an install of MS's fix on two machines.

We're good to go - I hope.

BTW, I just learned that Windows XP Home support dies 12/31/2006

Get your Microsoft support while you can. It has been pointed out today on various tech sites that XP Home and XP Media Player have support expiry dates this year.

XP Pro users don't need to start sweating just yet.


Sigh.
Printer Friendly | Permalink |  | Top
 
IDemo Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 09:21 PM
Response to Reply #120
124. Had no trouble at all -
Still strongly considering an iMac, however...

I thought Bill Gates showed some brass cojones touting the next Windows, "Vista", with this debacle still playing out.
Printer Friendly | Permalink |  | Top
 
BlackVelvet04 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 10:04 PM
Response to Reply #120
126. I haven't had any trouble at all. n/t
Printer Friendly | Permalink |  | Top
 
DainBramaged Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 10:07 PM
Response to Reply #120
127. Patch works great
Edited on Thu Jan-05-06 10:11 PM by DainBramaged
I have 48 computers in the morning I have to apply it too after un installing temp fix.

Gonna be a long day. At least the fucks at Microcrap listened to us.:crazy:

Auto updates turned off where I SYSADMIN. Too often MS patches cause problems with software used by client which is proprietary. Only a couple of systems are SP2 and not critical. Incompatible with SP2 and automotive software and GM. GM has more than cars to get right.
Printer Friendly | Permalink |  | Top
 
tiptoe Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jan-06-06 04:01 PM
Response to Original message
132. kick
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Wed Apr 24th 2024, 08:33 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC