路人CL - IT 手記

I may not talk about cutting edge technology but try to bring out issues that may have far-reaching effects and long term significance. Of course, as a link to those truly important IT security alerts!

Friday, December 30, 2005

Microsoft Windows Metafile Handling Buffer Overflow (Update)

Windows is vulnerable to remote code running through error in handling Windows Meta file format (.WMF). Exploit code has been publicly posted and used to successfully attack fully-patched Windows XP SP2 systems. Other Windows versions may also be at risk.

Workarounds:

Do not access WMF files from untrusted sources (like unknown website)

IT personnels can block access to WMF files at mail gateway, http proxies and other network filtering technologies.

Update:

Microsoft will release a patch on 10 Jan 2006.

Meanwhile a 3rd party patch by Mr Ilfak Guilfanov ,a senior developer of DataRescue, Belgium has been tested and recommended by SANS Institute for the time being. According to Mr Ilfak Guilfanov, this is a temporary fix and should be un-installed after Microsoft's release of the formal patch.

This is the first time a private 3rd party patch has been approved by a renowned security institute. Part of the reason is that Guilfanov put the patch with complete source code on line as open source. So SANS personnel are able to thoroughly test and verify that this is an honest work without backdoor.

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home