The new CRITICAL SERIOUS Windows vulnerability du jour

Operating System, Common Application & ThinkPad Utilities Questions...
Post Reply

Were you sceered?

Poll ended at Tue Jan 17, 2006 8:43 pm

I ain't 'fraid o' no ghosts!
0
No votes
I'm unplugging from the Internet for the rest of the week
1
25%
I just washed my operating system and I can't do a THING with it
0
No votes
I knew you were coming, so I baked a MALFORMED WEB FONT! :D
0
No votes
That's a big Twinkie!
0
No votes
Back off, man - I'm a scientist.
2
50%
Real biblical mayhem, oceans boiling, fire and brimstone, cats and dogs living together, TOTAL hysteria!
1
25%
 
Total votes: 4

Message
Author
davidspalding
ThinkPadder
ThinkPadder
Posts: 1593
Joined: Mon Nov 14, 2005 2:39 pm
Location: Durham, NC
Contact:

The new CRITICAL SERIOUS Windows vulnerability du jour

#1 Post by davidspalding » Tue Jan 10, 2006 8:43 pm

Haha, just whe you thought the worst was over ... eEye Digital Security privately reported a vulnerability with embedded Web fonts.

Microsoft Security Bulletin MS06-002
Vulnerability in Embedded Web Fonts Could Allow Remote Code Execution (908519)
This update resolves a newly-discovered, privately-reported vulnerability.

An attacker who successfully exploited this vulnerability could take control of an affected system. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

We recommend that customers apply the update immediately. (*emphasis added*)
FAQ for Windows Embedded Web Font Vulnerability - CVE-2006-0010:

What is the scope of the vulnerability?
If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

What causes the vulnerability?
When Windows displays a specially formed embedded Web font, it may corrupt system memory in such a way that an attacker could execute arbitrary code.

What might an attacker use the vulnerability to do?
An attacker who successfully exploited this vulnerability could take complete control of the affected system.

How could an attacker exploit the vulnerability?
An attacker could exploit this vulnerability by creating a malicious Web page or an HTML e-mail message and then persuading the user to visit the page or to view the HTML e-mail message. If the user visited the page or viewed the e-mail message, the attacker could access information from other Web sites, could access local files in predetermined locations on the system, or could cause malicious code to run in the security context of the locally logged on user. An attacker could also try to compromise a Web site and have it display malicious content. Additionally, it could also be possible to display specially crafted Web content by using banner advertisements or by using other methods to deliver Web content to affected systems.

What systems are primarily at risk from the vulnerability?
This vulnerability requires that a user is logged on and reading e-mail or visiting Web sites for any malicious action to occur. Therefore, any systems where e-mail is read or where Internet Explorer is used frequently, such as workstations or terminal servers, are at the most risk from this vulnerability. Systems that are not typically used to read e-mail or to visit Web sites, such as most server systems, are at a reduced risk....
The fix is available at Windows Update. If you don't have Automatic Updates configured in Windows 2000/XP to download updates, or even just alert you, you might reconsider. :roll:
Last edited by davidspalding on Wed Jan 11, 2006 2:55 pm, edited 1 time in total.
2668-75U T43, 2GB RAM, 2nd hand NMB kybd, Dock II, spare Mini-Dock, and spare Port Replicators. Wacom BT tablet. Ultrabay 2nd HDD.
2672-KBU X32, 1.5GB RAM, 7200 rpm TravelStar HDD.

DavidNZ
Senior Member
Senior Member
Posts: 554
Joined: Sat Jul 03, 2004 3:18 am
Location: New Zealand

#2 Post by DavidNZ » Tue Jan 10, 2006 11:24 pm

All hail MacBook Pro?
X40 (2371-6EM) w/ 768 RAM
XPP SP2
DLINK DI-614+

davidspalding
ThinkPadder
ThinkPadder
Posts: 1593
Joined: Mon Nov 14, 2005 2:39 pm
Location: Durham, NC
Contact:

#3 Post by davidspalding » Tue Jan 10, 2006 11:35 pm

Vive le penguin! Vive la difference!

AndyL
Posts: 48
Joined: Wed Sep 07, 2005 8:31 am
Location: UK
Contact:

#4 Post by AndyL » Wed Jan 11, 2006 7:57 am

davidspalding wrote:Vive le penguin! Vive la difference!
"Le penguin" is not immune from security holes either :wink:
http://www.us-cert.gov/cas/bulletins/SB2005.html

But definitely vive la difference - a monoculture is bound to be more vulnerable to disease epidemics.

davidspalding
ThinkPadder
ThinkPadder
Posts: 1593
Joined: Mon Nov 14, 2005 2:39 pm
Location: Durham, NC
Contact:

#5 Post by davidspalding » Wed Jan 11, 2006 9:23 am

Linux needs regular patching if you run a server ... but still ... I haven't heard of a vulnerability in UNIX that reads like, "if you install web browsing software, or media player software, and someone forces some malformed code on you, your entire system could accessed as root, and a hacker do anything." I mean ... yikes. In the past, that has been a regular issue with IE/Outlook (Express)/Windows. :roll:

Post Reply
  • Similar Topics
    Replies
    Views
    Last post

Return to “Windows OS (Versions prior to Windows 7)”

Who is online

Users browsing this forum: No registered users and 2 guests