| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Severe Windows Vulnerability |
The following information is from the Frisk Software (www.f-prot.com) website...among others...about a severe security vulnerability that affects potentially ALL Windows systems...from Windows 3.x to Windows XP...called the Zero Day Vulnerabilty. Other virus protection web sites such as Sophos (www.sophos.com) and F-Secure (www.f-secure.com) have similar postings. According to Sophos, already over 100 attacks using this vulnerability, have been reported. Over the weekend, hackers published the code used to exploit this flaw. These sites note that while the Internet Explorer browser is particularly vulnerable to this, the Mozilla Firefox browser (www.mozilla.com/firefox), and the Opera browser (www.opera.com) will ASK if you wish to open such a file, if one is encountered (Internet Explorer apparently opens it automatically). If you answer yes, you most likely will get "hit". Since Microsoft apparently only supports the current and the previous version of Windows...users of earlier Windows versions will likely NOT receive a patch from Microsoft for this vulnerability. This includes Windows 3.x, 95, 98, and ME...and they're strongly urged to upgrade. *** Microsoft has released a security advisory warning of a vulnerability in a Windows graphics rendering engine that could allow for remote code execution by an attacker on an affected system. Over the past few days a number of Trojans and other malware have appeared that take advantage of this vulnerability via doctored image files sent as attachments to e-mails or embedded in webpages. The vulnerability lies in the way Windows handles the Windows Metafile (.wmf) image file format. Since the vulnerability was first discovered, numerous websites and mass-delivered e-mail messages have taken advantage of this vulnerability to install spyware as well as viruses and other malware on vulnerable machines. Among other things, affected computers are used to send out thousands of spam e-mails without the knowledge or consent of their owners. Although the behaviour creating this vulnerability is currently causing serious problems, it was originally a important feature of the Windows operating system and appears to have been part of Windows since version 3.0 was first released 15 years ago. This vulnerability therefore affects a very large number of computer users. F-Prot Antivirus currently detects all know exploits of this vulnerability and tags them as "Security risk". We are also working on pre-emptive protection against any and all future threats attempting to take advantage of this vulnerability. Microsoft has not yet released a patch against this vulnerability (it has announced that it won't release one until Jan. 10 "after extensive testing")...but has described a workaround for the problem for users of Windows XP: These users can avoid exploit attacks by unregistering the Windows Picture and Fax Viewer, as noted below. *** Un-registering the Windows Picture and Fax Viewer (Shimgvw.dll) on Windows XP Service Pack 1; Windows XP Service Pack 2; Windows Server 2003 and Windows Server 2003 Service Pack 1 Microsoft has tested the following workaround. While this workaround will not correct the underlying vulnerability, it helps block known attack vectors. When a workaround reduces functionality, it is identified in the following section. Note: The following steps require Administrative privileges. It is recommended that the machine be restarted after applying this workaround. It is also possible to log out and log back in after applying the workaround. However, the recommendation is to restart the machine. To un-register Shimgvw.dll, follow these steps: 1. Click Start, click Run, type "regsvr32 -u %windir%\system32\shimgvw.dll" (without the quotation marks), and then click OK. 2. A dialog box appears to confirm that the un-registration process has succeeded. Click OK to close the dialog box. Impact of Workaround: The Windows Picture and Fax Viewer will no longer be started when users click on a link to an image type that is associated with the Windows Picture and Fax Viewer. --- SBBSecho 2.11-Win32* Origin: The Thunderbolt BBS 501-223-2541 tbolt.synchro.net (1:382/33) SEEN-BY: 633/267 270 5030/786 @PATH: 382/33 61 140/1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.