A SERIOUS new Windows Vulnerability

Operating System, Common Application & ThinkPad Utilities Questions...
Message
Author
andyP
**SENIOR** Member
**SENIOR** Member
Posts: 821
Joined: Tue Dec 27, 2005 10:56 am
Location: Ratingen, Germany
Contact:

A SERIOUS new Windows Vulnerability

#1 Post by andyP » Fri Dec 30, 2005 8:20 am

Gibson Research Corporation has reported on a new security threat to all windows OSs. They offer a workaround and Q & A at:

http://www.grc.com/default.htm
T61p 6460-67G; 15,4 WSXGA+ W7P x64, no hairdryer.
T43p 2668-G2G, 14,1 SXGA+, XP Pro, internal hairdryer
T23 2647-9LG, 14,1 SXGA+, XP Pro, no hairdryer

dsvochak
ThinkPadder
ThinkPadder
Posts: 1160
Joined: Mon Jan 03, 2005 3:08 pm
Location: Lansing, MI

#2 Post by dsvochak » Fri Dec 30, 2005 11:06 am

Link to the Microsoft Security Advisory on this issue:
http://www.microsoft.com/technet/securi ... 12840.mspx
I used to be an anarchist but I quit because there were too many rules

davidspalding
ThinkPadder
ThinkPadder
Posts: 1593
Joined: Mon Nov 14, 2005 2:39 pm
Location: Durham, NC
Contact:

#3 Post by davidspalding » Fri Dec 30, 2005 3:38 pm

Steve Gibson, pshaw.... Used to have some neat utilities and ideas, but after the "sky is falling" incidents of 2001, 2002, Chicken Little is more appropriate. Still has neat utilities that check for vulnerabilities, but his touting of each vulnerability as "severe" has worn thin for this boy.

Same old mantras apply, keep your AV current, don't respond to questionable or suspicious e-mails, and refrain from visiting questionable web sites without having a good recent backup (make one now while you're thinking of it). :P
2668-75U T43, 2GB RAM, 2nd hand NMB kybd, Dock II, spare Mini-Dock, and spare Port Replicators. Wacom BT tablet. Ultrabay 2nd HDD.
2672-KBU X32, 1.5GB RAM, 7200 rpm TravelStar HDD.

DavidNZ
Senior Member
Senior Member
Posts: 554
Joined: Sat Jul 03, 2004 3:18 am
Location: New Zealand

#4 Post by DavidNZ » Fri Dec 30, 2005 6:03 pm

I've heard of that drama involving Mr Gibson back in the day, but have yet to fully investigate what the fuss was about. He is currently doing a security-related podcast with Leo Laporte (called Security Now) that is quite informative.
X40 (2371-6EM) w/ 768 RAM
XPP SP2
DLINK DI-614+

davidspalding
ThinkPadder
ThinkPadder
Posts: 1593
Joined: Mon Nov 14, 2005 2:39 pm
Location: Durham, NC
Contact:

#5 Post by davidspalding » Fri Dec 30, 2005 10:20 pm

[tongue in cheek]After fending off a DDoS attack on his site, and documenting in excruciating detail how it was done and how it spelled the End of Days for the Internet, Mr. Gibson shrieked long and loud, without much humility, that the raw sockets capability of (then unreleased) Windows XP would be the sure and final doom of the Internet, and spell the decline and fall of tech-civilization as we know it. Sony BMG notwithstanding, the Net and personal computing are alive and well today.

Some semi-objective coverage can be found here:

http://forms.theregister.co.uk/search/? ... gibson+grc

And here's a favorite:

http://www.theregister.co.uk/2002/02/25 ... yncookies/

[/tongue in cheek]

GomJabbar
Moderator
Moderator
Posts: 9765
Joined: Tue Jun 07, 2005 6:57 am

#6 Post by GomJabbar » Sat Dec 31, 2005 1:30 am

The sky is falling! The sky is falling! :o

Remember what happened to the villagers when they ignored the "Boy who cried Wolf" :shock:

From The Washington Post, Friday, December 30, 2005
Windows Security Flaw Is 'Severe'
PCs Vulnerable to Spyware, Viruses

[i]The Washington Post[/i] wrote:Mike Reavey, operations manager for Microsoft's Security Response Center, called the flaw "a very serious issue."
-------------------------------
"The problem with this attack is that it is so hard to defend against for the average user," said Johannes Ullrich, chief research officer for the SANS Internet Storm Center in Bethesda.

At first, the vulnerability was exploited by just a few dozen Web sites. Programming code embedded in these pages would install a program that warned victims their machines were infested with spyware, then prompted them to pay $40 to remove the supposed pests.

Since then, however, hundreds of sites have begun using the flaw to install a broad range of malicious software. SANS has received several reports of attackers blasting out spam e-mails containing links that lead to malicious sites exploiting the new flaw, Ullrich said.

Dean Turner, a senior manager at anti-virus firm Symantec Corp. of Cupertino, Calif., said the company has seen the vulnerability exploited to install software that intercepts personal and financial information when users of infected computers enter the data at certain banking or e-commerce sites.
-----------------------------
Richard M. Smith, a Boston security and privacy consultant, said he was particularly worried that the vulnerability could soon be used to power a fast-spreading e-mail worm.

"We could see the mother of all worms here," Smith said. "My big fear is we're going to wake up in the next week or two and have people warning users not to read their e-mail because something is going around that's extremely virulent."
DKB

DavidNZ
Senior Member
Senior Member
Posts: 554
Joined: Sat Jul 03, 2004 3:18 am
Location: New Zealand

#7 Post by DavidNZ » Sat Dec 31, 2005 2:51 am

davidspalding wrote:Sony BMG notwithstanding, the Net and personal computing are alive and well today.
Sensational. Had a good laugh out loud at that one! :)
X40 (2371-6EM) w/ 768 RAM
XPP SP2
DLINK DI-614+

dvorak
Junior Member
Junior Member
Posts: 337
Joined: Wed Jan 26, 2005 11:22 am
Location: Estonia

#8 Post by dvorak » Sat Dec 31, 2005 6:33 am

Just use the latest version of Firefox and do not download any WMF files to your hard drive, as simple as that. Unregistering the Image Viewer DLL also disables viewing images on your computer via the convenient viewer, so that's no good.
Written behind a T42, 2373-9UG.
1.8GHz CPU, 1GB RAM, 80GB HDD, ATI-MR9600 64MB GPU, SXGA+ LCD, a/b/g WiFi, CD-RW/DVD

GomJabbar
Moderator
Moderator
Posts: 9765
Joined: Tue Jun 07, 2005 6:57 am

#9 Post by GomJabbar » Sat Dec 31, 2005 8:02 am

dvorak wrote:Unregistering the Image Viewer DLL also disables viewing images on your computer via the convenient viewer, so that's no good.
Well, I unregistered the Image Viewer DLL. It's true that you can't view images via Windows Picture and Fax Viewer, or see thumbnail views in Explorer. However, you can view images in Paint or any number of other programs. You can also view thumbnails with other picture managing software you may have, such as ArcSoft PhotoImpression.

Since this is only a temporary work-around, I can live with the inconvenience for a couple of weeks, or until Windows Update fixes the Security issue.

I am neutral regarding Steve Gibson, but I do commend him for listing an easy workaround for this security issue, and for listing the undo for the workaround.
DKB

dvorak
Junior Member
Junior Member
Posts: 337
Joined: Wed Jan 26, 2005 11:22 am
Location: Estonia

#10 Post by dvorak » Sat Dec 31, 2005 8:26 am

Well dosens of sites listed the easy fix way before Steve :)
It's always the first thing one can do, remove the DLLs with the hole.

Using Firefox should be the first thing to do these days, lot's of undocumented security holes with IE that get exploited quietly.
Written behind a T42, 2373-9UG.
1.8GHz CPU, 1GB RAM, 80GB HDD, ATI-MR9600 64MB GPU, SXGA+ LCD, a/b/g WiFi, CD-RW/DVD

GomJabbar
Moderator
Moderator
Posts: 9765
Joined: Tue Jun 07, 2005 6:57 am

#11 Post by GomJabbar » Sat Dec 31, 2005 9:10 am

dvorak wrote:Well dosens of sites listed the easy fix way before Steve :)
It's always the first thing one can do, remove the DLLs with the hole.
As it happens, I first read about this security problem on this thread. :)
dvorak wrote:Using Firefox should be the first thing to do these days, lot's of undocumented security holes with IE that get exploited quietly.
I agree - at least about the part regarding the use of Internet Explorer. I still do most of my web browsing with Netscape 7.2. I prefer its interface to Firefox. . Other times I use Opera. I like the features of Opera. I like how easy it is to zoom in and out on images (using the + & - keys), I like the tabs, and I like that when you close Opera and later reopen it; any pages that were open when it was closed appear immediately. I have Firefox on my ThinkPad as well, but I do not use it very often.
DKB

dvorak
Junior Member
Junior Member
Posts: 337
Joined: Wed Jan 26, 2005 11:22 am
Location: Estonia

#12 Post by dvorak » Sat Dec 31, 2005 9:16 am

Unfortunately all versions of Opera are still exploitable, apparently it uses the DLL to display the WMFs.

The reopening tabs thing can be added to Firefox with SessionSaver extension.
Written behind a T42, 2373-9UG.
1.8GHz CPU, 1GB RAM, 80GB HDD, ATI-MR9600 64MB GPU, SXGA+ LCD, a/b/g WiFi, CD-RW/DVD

GomJabbar
Moderator
Moderator
Posts: 9765
Joined: Tue Jun 07, 2005 6:57 am

#13 Post by GomJabbar » Sat Dec 31, 2005 12:12 pm

http://www.f-secure.com/weblog/archives ... l#00000752
f-secure.com wrote:In our tests (under XP SP2) older versions of Firefox (1.0.4) defaulted to open WMF files with "Windows Picture and Fax Viewer", which is vulnerable. Newer versions (1.5) defaulted to open them with Windows Media Player, which is not vulnerable...but then again, Windows Media Player is not able to show WMF files at all so this might be a bug in Firefox. Opera 8.51 defaults to open WMF files with "Windows Picture and Fax Viewer" too. However, all versions of Firefox and Opera prompt the user first.
DKB

davidspalding
ThinkPadder
ThinkPadder
Posts: 1593
Joined: Mon Nov 14, 2005 2:39 pm
Location: Durham, NC
Contact:

#14 Post by davidspalding » Sat Dec 31, 2005 12:13 pm

Me, too, Gom, since I stopped writing about such things, I just wait until I stumble across it. I don't do a lot of wandering on the Web anyway.

Be it noted, when SANS, CERT, or Richard Smith (a far more moderate security commentator, and One Smart Fellow indeed) chime in, then the danger is real. It's just that Gibson has but two settings on his volume meter: normal, and DEFCON 1. Rob Rosenberger has 2-3 very, very funny puns on his pages, if you Google for both their names, you'll find them.

GomJabbar
Moderator
Moderator
Posts: 9765
Joined: Tue Jun 07, 2005 6:57 am

#15 Post by GomJabbar » Sat Dec 31, 2005 12:20 pm

GomJabbar wrote:Well, I unregistered the Image Viewer DLL. It's true that you can't view images via Windows Picture and Fax Viewer, or see thumbnail views in Explorer. However, you can view images in Paint or any number of other programs. You can also view thumbnails with other picture managing software you may have, such as ArcSoft PhotoImpression.
After I wrote the above, I ran across the following information:

http://www.f-secure.com/weblog/archives ... l#00000752
f-secure.com wrote:The amount of trojans using the zero-day WMF exploit is increasing rapidly.

Many people have now used the REGSRV32 workaround to stop the immediate threat. Some users have come back to us after we quoted Microsoft on the workaround wondering if the workaround really works. The workaround will stop the exploit for Internet Explorer and Explorer - even though WMF images still show as normal.

What the workaround does not stop against is if you open an exploited file in MSPAINT (aka Paintbrush). And like always, renaming the file to any other image extension will not make a difference to MSPAINT. So our suggestion is to not open any pictures right now with MSPAINT whatsoever. Perhaps leaving image editors out completely for the rest of the year might be a good idea. [bolding added]
DKB

davidspalding
ThinkPadder
ThinkPadder
Posts: 1593
Joined: Mon Nov 14, 2005 2:39 pm
Location: Durham, NC
Contact:

#16 Post by davidspalding » Sat Dec 31, 2005 4:52 pm

I'll be darned, in this case, Steve-o is running with a valid alarm. And my snarky response wasn't entirely appropriate. ,)

MOD ... might want to make a sticky or announcement for a week or so until MS has a patch. Your call, of course.

For those too lazy to follow the links, here's Microsoft's suggested action as of 12/28:
Un-register the Windows Picture and Fax Viewer (Shimgvw.dll) on Windows XP Service Pack 1; Windows XP Service Pack 2; Windows Server 2003 and Windows Server 2003 Service Pack 1

Microsoft has tested the following workaround. While this workaround will not correct the underlying vulnerability, it helps block known attack vectors. When a workaround reduces functionality, it is identified in the following section.

Note The following steps require Administrative privileges. It is recommended that the machine be restarted after applying this workaround. It is also possible to log out and log back in after applying the workaround. However, the recommendation is to restart the machine.

To un-register Shimgvw.dll, follow these steps:
  1. Click Start, click Run, type "regsvr32 -u %windir%\system32\shimgvw.dll" (without the quotation marks), and then click OK.
  2. A dialog box appears to confirm that the un-registration process has succeeded. Click OK to close the dialog box.
Impact of Workaround: The Windows Picture and Fax Viewer will no longer be started when users click on a link to an image type that is associated with the Windows Picture and Fax Viewer.

To undo this change, re-register Shimgvw.dll by following the above steps. Replace the text in Step 1 with “regsvr32 %windir%\system32\shimgvw.dll” (without the quotation marks).

GomJabbar
Moderator
Moderator
Posts: 9765
Joined: Tue Jun 07, 2005 6:57 am

#17 Post by GomJabbar » Sat Dec 31, 2005 10:05 pm

From PC World: Extremely Critical Windows Security Hole
PC World wrote:Secunia, Kaspersky and others have alerts up today about a new vulnerability in the way Windows handles Metafile files (*.wmf). It's a bad one: it has the highest possible risk rating, there aren't patches yet, and there are known exploits in the wild that take advantage of the hole.
DKB

dvorak
Junior Member
Junior Member
Posts: 337
Joined: Wed Jan 26, 2005 11:22 am
Location: Estonia

#18 Post by dvorak » Sun Jan 01, 2006 12:30 am

GomJabbar wrote:http://www.f-secure.com/weblog/archives ... l#00000752
f-secure.com wrote:In our tests (under XP SP2) older versions of Firefox (1.0.4) defaulted to open WMF files with...
Yes, well aware of that, and that's why I wrote exactly that:
dvorak wrote:Just use the latest version of Firefox and do not download any WMF files to your hard drive, as simple as that.
Not using 1.0.7/1.5 is bad anyways, there were some other security fault with the older ones anyway.
Written behind a T42, 2373-9UG.
1.8GHz CPU, 1GB RAM, 80GB HDD, ATI-MR9600 64MB GPU, SXGA+ LCD, a/b/g WiFi, CD-RW/DVD

GomJabbar
Moderator
Moderator
Posts: 9765
Joined: Tue Jun 07, 2005 6:57 am

#19 Post by GomJabbar » Sun Jan 01, 2006 1:42 am

dvorak wrote:Unfortunately all versions of Opera are still exploitable, apparently it uses the DLL to display the WMFs.
f-secure.com wrote:Opera 8.51 defaults to open WMF files with "Windows Picture and Fax Viewer" too. However, all versions of Firefox and Opera prompt the user first.
f-secure.com wrote:Newer versions (1.5) defaulted to open them with Windows Media Player, which is not vulnerable...but then again, Windows Media Player is not able to show WMF files at all so this might be a bug in Firefox.
It seems you left out some strategic parts of my previous quote from f-secure.com. My point was the both Opera and Firefox can be vulnerable. Also f-secure.com brings up an interesting point; why does Firefox 1.5 attempt to open WMF files with a program that can't open them? Maybe they had a premonition?

I don't want to get in a Firefox vs. Opera war. Both are very good browsers - each with their strengths and weaknesses. To each his own. As they say YMMV. :wink:
DKB

dvorak
Junior Member
Junior Member
Posts: 337
Joined: Wed Jan 26, 2005 11:22 am
Location: Estonia

#20 Post by dvorak » Sun Jan 01, 2006 8:48 am

Well, if neither of the browsers display the image through the DLL, then they're not vulnerable at all. Otherwise one would have to say that every browser is vulnerable to every simple .exe virus, because if you click on one, and then open one, it'll infect.
Written behind a T42, 2373-9UG.
1.8GHz CPU, 1GB RAM, 80GB HDD, ATI-MR9600 64MB GPU, SXGA+ LCD, a/b/g WiFi, CD-RW/DVD

GomJabbar
Moderator
Moderator
Posts: 9765
Joined: Tue Jun 07, 2005 6:57 am

#21 Post by GomJabbar » Sun Jan 01, 2006 1:10 pm

Some updated info from The Washington Post.

New Exploit for Unpatched Windows Flaw
[i]The Washington Post[/i] wrote:The part that's different about this attack is that it's designed to generate slightly different program code each time the exploit is run -- creating a new threat with a random file size, non-WMF file extension (like .jpeg) and other variable tricks. The folks over at the SANS Internet Storm Center have more detailed information about the new exploit if you're interested.
---------------------------------------
SANS said the random garbage added onto any attack code generated with the new exploit could make it very hard for anti-virus companies to develop signatures to detect the new threats.
DKB

DavidNZ
Senior Member
Senior Member
Posts: 554
Joined: Sat Jul 03, 2004 3:18 am
Location: New Zealand

#22 Post by DavidNZ » Sun Jan 01, 2006 11:16 pm

Well, according to Gibson, the Windows DLL patch isn't that great:

http://www.grc.com/sn/notes-020.htm

I've installed the patch he recommends (from http://www.hexblog.com/) and seems to be fine.
X40 (2371-6EM) w/ 768 RAM
XPP SP2
DLINK DI-614+

davidspalding
ThinkPadder
ThinkPadder
Posts: 1593
Joined: Mon Nov 14, 2005 2:39 pm
Location: Durham, NC
Contact:

#23 Post by davidspalding » Mon Jan 02, 2006 12:23 pm

More from Chicken Little.... (sigh) Bears pointing out that this "patch" is neither official nor necessarily recommended. When in doubt, follow the accepted authority, in this case Microsoft. Update AV software, wait for security hotfix from MS, yadda yadda yadda.

Not that anyone cares, but the DLL that needs to be de-registered also contributes to some XP look and feel, including
  • Desktop icon label drop shadows (reverts to old Windows behavior)
  • Preview of images in Display Properties Themes and Desktop tabs
Took me a little time last night figuring out what I'd mucked up this time (The Muck-up Of The Week), until realizing that I was running in Band-Aid mode. ;)

GomJabbar
Moderator
Moderator
Posts: 9765
Joined: Tue Jun 07, 2005 6:57 am

#24 Post by GomJabbar » Mon Jan 02, 2006 7:13 pm

From TECHWORLD: Don't wait for Microsoft to fix WMF flaw
TECHWORLD wrote:Windows users should install an unofficial security patch now, without waiting for Microsoft to make its move, advised security researchers at The SANS Institute's Internet Storm Center (ISC).

Their recommendation follows a new wave of attacks on a flaw in the way versions of Windows from 98 through XP handle malicious files in the WMF (Windows Metafile) format.
------------------------------
In addition, source code for a new exploit was widely available on the Internet by Saturday, allowing the creation of new attacks with varied payloads.The file "HappyNewYear.jpg," for example, attempts to download the Bifrose backdoor, researchers said.

These factors exacerbate the problem, according to Ken Dunham, director of the rapid response team at iDefense.

"Risk has gone up significantly in the past 24 hours for any network still not protected against the WMF exploit," Dunham warned.
DKB

DavidNZ
Senior Member
Senior Member
Posts: 554
Joined: Sat Jul 03, 2004 3:18 am
Location: New Zealand

#25 Post by DavidNZ » Mon Jan 02, 2006 7:46 pm

Gibson vindicated, if only a little, seeing as SANS recommending the same thing?

Question will be whether MS patches 98 and ME. May mean I have to buy my mother a new Mac!
X40 (2371-6EM) w/ 768 RAM
XPP SP2
DLINK DI-614+

AndyL
Posts: 48
Joined: Wed Sep 07, 2005 8:31 am
Location: UK
Contact:

#26 Post by AndyL » Tue Jan 03, 2006 6:15 am

I think a patch for Win98 is likely, MS have said they will continue patching critical vulns until the middle of this year. They released a Win98 patch for MS05-054 in December, and that was of a similar severity.

dsvochak
ThinkPadder
ThinkPadder
Posts: 1160
Joined: Mon Jan 03, 2005 3:08 pm
Location: Lansing, MI

#27 Post by dsvochak » Tue Jan 03, 2006 2:54 pm

From the updated MS Security Bullitin (link in my original post in this thread):
Microsoft has completed development of the security update for the vulnerability. The security update is now being localized and tested to ensure quality and application compatibility. Microsoft’s goal is to release the update on Tuesday, January 10, 2006, as part of its monthly release of security bulletins. This release is predicated on successful completion of quality testing.
---------
Microsoft has been carefully monitoring the attempted exploitation of the WMF vulnerability since it became public last week, through its own forensic capabilities and through partnerships within the industry and law enforcement. Although the issue is serious and malicious attacks are being attempted, Microsoft’s intelligence sources indicate that the scope of the attacks are not widespread.

In addition, anti-virus companies indicate that attacks based on exploiting the WMF vulnerability are being effectively mitigated through up-to-date signatures.
Sometimes (most times) I think these threats are over-hyped.
I used to be an anarchist but I quit because there were too many rules

GomJabbar
Moderator
Moderator
Posts: 9765
Joined: Tue Jun 07, 2005 6:57 am

#28 Post by GomJabbar » Tue Jan 03, 2006 6:14 pm

Whether it is over-hyped or underplayed, I think depends somewhat on the source - how it is benefitted or adversely affected. Just more politics, marketing, and damage control.

For my part, I intend to err on the side of caution. YMMV :wink:
DKB

GomJabbar
Moderator
Moderator
Posts: 9765
Joined: Tue Jun 07, 2005 6:57 am

#29 Post by GomJabbar » Wed Jan 04, 2006 6:43 pm

From: Information Week, Jan 4, 2006 01:00 PM Unauthorized Patch For Microsoft WMF Bug Sparks Controversy

EDIT: Another article from: The Washington Post, Wednesday, January 4, 2006 Experts Advocate Non-Microsoft Windows Patch
[i]The Washington Post[/i] wrote:Another computer-security firm, Symantec Corp., said Microsoft's decision to delay the patch for another week presents attackers with a "seven-day window that attackers could exploit this issue in a potentially widespread and serious fashion." The Cupertino, Calif., company raised its threat alert to the highest level in 16 months.
DKB

davidspalding
ThinkPadder
ThinkPadder
Posts: 1593
Joined: Mon Nov 14, 2005 2:39 pm
Location: Durham, NC
Contact:

#30 Post by davidspalding » Thu Jan 05, 2006 2:24 pm

Bunch of @#&(*#@)_$ing malarkey. If you unregister the .DLL like the advisory says, you're protected [edit]from most online exploits[/edit]. You don't to install a third-party fix, skip to my loo, or go round and round the mulberry bush. One line command in the Start ... Run dialog, and you're protected from the few, rare nasties there are to exploit this.

I haven't seen a WORD (haven't been looking, either) about who NEEDS to have the ability to see thumbnails in Explorer this week. So what's the big freakin' deal?

Just shows how uninformed most technology reporters are about security holes and Trojans.
Last edited by davidspalding on Fri Jan 06, 2006 9:02 am, edited 1 time in total.

Post Reply
  • Similar Topics
    Replies
    Views
    Last post

Return to “Windows OS (Versions prior to Windows 7)”

Who is online

Users browsing this forum: No registered users and 2 guests