0-Day Exploit : MS/IE – WMF Remote Code – Fix!

Filed under Downloads, Security News, Security Programs, Windows

A little spice to the end of 2005… Christmas was nice spending it with family, securing their computers, the usual for holidays with the family. Only if it was that easy this year, as of this morning a new exciting exploit was released. The good news is my current configuration wasn’t affected by this annoyance. So, we’re going to list the advisory released by FrSIRT and let you review that, then we’ll move forward to steps to take for protecting yourself. Also, look at the end for references.

Rated as : Critical
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2005-12-28

Technical Description

A vulnerability has been identified in Microsoft Windows, which could be exploited by remote attackers to execute arbitrary commands. This flaw is due to an error in the rendering of Windows Metafile (WMF) image formats, which could be exploited by attackers to remotely take complete control of an affected system by convincing a user to open a malicious WMF file using a vulnerable application (e.g. Windows Picture and Fax Viewer), or visit a specially crafted Web page that is designed to automatically exploit this vulnerability through Internet Explorer.

Note : This unpatched vulnerability is currently being exploited in the wild.

Exploits

http://www.frsirt.com/exploits/20051228.ie_xp_pfv_metafile.pm.php

Affected Products

Microsoft Windows XP Service Pack 1
Microsoft Windows XP Service Pack 2
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003
Microsoft Windows Server 2003 Service Pack 1
Microsoft Windows Server 2003 for Itanium-based Systems
Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
Microsoft Windows Server 2003 x64 Edition

Solution

The FrSIRT is not aware of any official supplied patch for this issue.

References

http://www.frsirt.com/english/advisories/2005/3086

http://www.frsirt.com/exploits/20051228.ie_xp_pfv_metafile.pm.php

Credits

Vulnerability reported in the wild by noemailpls

ChangeLog

2005-12-28 : Original Advisory

Tech-Security Explains:
As shown by FrSIRT, there is no real solution for this until we receive a patch to fully resolve the issue. However, there are steps you can take in protection yourself. I’m running Firefox 1.5 Final w/ NoScript extension and configured browser settings (mentioned in an early thread) and when I went to one of the infected site, I wasn’t hit by the exploit.

Want to start thinking about secure browsing?? Good it’s about time…

Update your anti-virus software 1-3 times a day, this way if you do get infected by this exploit, you’ll have protection shortly afterwards. not good enough? I agree…

Tech-Security Recommended Fix:
For safe browser…I would recommend installed VMWARE and install a fresh copy of Windows. This enables you to browser within the VMWARE isntance of Windows, allowing nothing to enter into your production OS version. This is a great idea for browsing and testing exploits/infected programs. Just be sure you keep your VMWARE Workstation updated too.

Protect yourself:
VMWARE Workstation 5.5
[ more info ] . [ download ]

Easiest Fix:
Windows Media File Viewer | [disable] . [enable]

This is more of a temp solution, which is why we recommend VMWARE, it might seem like a hassle at first, but no more than if you get infected with a serious virus. Atlease VMWARE is a one-time deal.

2 Comments

  1. WaltDe says:

    Keep up the great work on your blog. Best wishes WaltDe

Post a Comment

Your email is never published nor shared. Required fields are marked *

*
*