±Recent Visitors

Recent Visitors to Com-Central!

±User Info-big


Welcome Anonymous

Nickname
Password

Membership:
Latest: cgsimpson
New Today: 0
New Yesterday: 0
Overall: 6645

People Online:
Members: 0
Visitors: 886
Total: 886
Who Is Where:
 Visitors:
01: Community Forums
02: Community Forums
03: Your Account
04: Photo Gallery
05: Photo Gallery
06: Community Forums
07: Community Forums
08: Community Forums
09: Community Forums
10: Community Forums
11: Community Forums
12: Community Forums
13: Photo Gallery
14: Community Forums
15: Home
16: Community Forums
17: Community Forums
18: Home
19: Home
20: Community Forums
21: Community Forums
22: Photo Gallery
23: Downloads
24: Downloads
25: Community Forums
26: Photo Gallery
27: Photo Gallery
28: Community Forums
29: Member Screenshots
30: Home
31: Home
32: Community Forums
33: Member Screenshots
34: Community Forums
35: Community Forums
36: Community Forums
37: Member Screenshots
38: Community Forums
39: CPGlang
40: Community Forums
41: Community Forums
42: Community Forums
43: Member Screenshots
44: Community Forums
45: Home
46: Photo Gallery
47: Photo Gallery
48: Photo Gallery
49: Photo Gallery
50: Community Forums
51: Photo Gallery
52: Home
53: Home
54: Photo Gallery
55: Home
56: Community Forums
57: Downloads
58: Community Forums
59: Community Forums
60: Your Account
61: Downloads
62: Community Forums
63: Community Forums
64: CPGlang
65: Photo Gallery
66: Community Forums
67: Community Forums
68: Community Forums
69: Community Forums
70: Photo Gallery
71: News
72: Community Forums
73: Downloads
74: CPGlang
75: Photo Gallery
76: Photo Gallery
77: Photo Gallery
78: Photo Gallery
79: CPGlang
80: Community Forums
81: Community Forums
82: Photo Gallery
83: Community Forums
84: Photo Gallery
85: Community Forums
86: Tell a Friend
87: Community Forums
88: Photo Gallery
89: Photo Gallery
90: Community Forums
91: Community Forums
92: Community Forums
93: CPGlang
94: Community Forums
95: Home
96: Community Forums
97: Community Forums
98: Photo Gallery
99: Downloads
100: Community Forums
101: Community Forums
102: Home
103: Statistics
104: Photo Gallery
105: Community Forums
106: Community Forums
107: Photo Gallery
108: Photo Gallery
109: Community Forums
110: Photo Gallery
111: Community Forums
112: Home
113: Photo Gallery
114: Community Forums
115: Photo Gallery
116: Photo Gallery
117: Community Forums
118: Community Forums
119: Photo Gallery
120: Member Screenshots
121: Community Forums
122: Community Forums
123: Your Account
124: Community Forums
125: Community Forums
126: Home
127: Community Forums
128: Community Forums
129: Photo Gallery
130: Home
131: Home
132: Photo Gallery
133: Community Forums
134: Community Forums
135: Photo Gallery
136: Community Forums
137: Community Forums
138: Community Forums
139: Downloads
140: Community Forums
141: Photo Gallery
142: Community Forums
143: CPGlang
144: Community Forums
145: Community Forums
146: Photo Gallery
147: Photo Gallery
148: Community Forums
149: Photo Gallery
150: Community Forums
151: Community Forums
152: Photo Gallery
153: Community Forums
154: Community Forums
155: Community Forums
156: Community Forums
157: Community Forums
158: Photo Gallery
159: Statistics
160: Community Forums
161: Community Forums
162: Community Forums
163: Photo Gallery
164: Community Forums
165: Community Forums
166: Community Forums
167: News Archive
168: Community Forums
169: Member Screenshots
170: Community Forums
171: Downloads
172: Member Screenshots
173: News
174: Photo Gallery
175: Photo Gallery
176: Photo Gallery
177: Community Forums
178: Photo Gallery
179: Community Forums
180: Community Forums
181: Home
182: Photo Gallery
183: Community Forums
184: Home
185: Home
186: Your Account
187: Community Forums
188: Photo Gallery
189: Community Forums
190: Community Forums
191: Photo Gallery
192: Home
193: Photo Gallery
194: Community Forums
195: Community Forums
196: Community Forums
197: Community Forums
198: Community Forums
199: Community Forums
200: Home
201: Photo Gallery
202: Downloads
203: Home
204: Photo Gallery
205: Photo Gallery
206: Community Forums
207: Community Forums
208: Photo Gallery
209: Community Forums
210: Photo Gallery
211: Photo Gallery
212: Community Forums
213: Community Forums
214: Photo Gallery
215: CPGlang
216: Community Forums
217: CPGlang
218: Community Forums
219: Photo Gallery
220: Community Forums
221: Member Screenshots
222: Photo Gallery
223: Member Screenshots
224: Home
225: Community Forums
226: Photo Gallery
227: Community Forums
228: Photo Gallery
229: Downloads
230: Community Forums
231: Community Forums
232: Community Forums
233: Downloads
234: Community Forums
235: Community Forums
236: Photo Gallery
237: Home
238: Downloads
239: Community Forums
240: Home
241: Downloads
242: Community Forums
243: Community Forums
244: Community Forums
245: Community Forums
246: Community Forums
247: Community Forums
248: Community Forums
249: Community Forums
250: Community Forums
251: Community Forums
252: Community Forums
253: Photo Gallery
254: Community Forums
255: Community Forums
256: Home
257: Community Forums
258: Community Forums
259: Community Forums
260: Community Forums
261: Photo Gallery
262: Photo Gallery
263: Community Forums
264: Home
265: Community Forums
266: Community Forums
267: Community Forums
268: Community Forums
269: Downloads
270: Photo Gallery
271: Community Forums
272: Member Screenshots
273: Photo Gallery
274: Community Forums
275: Home
276: Community Forums
277: Community Forums
278: Community Forums
279: Downloads
280: Home
281: Community Forums
282: Community Forums
283: Community Forums
284: Community Forums
285: Community Forums
286: Photo Gallery
287: Home
288: Photo Gallery
289: Community Forums
290: Photo Gallery
291: Photo Gallery
292: Downloads
293: Community Forums
294: Community Forums
295: Community Forums
296: Community Forums
297: Community Forums
298: Community Forums
299: Community Forums
300: Photo Gallery
301: Photo Gallery
302: Photo Gallery
303: Photo Gallery
304: Community Forums
305: Community Forums
306: Home
307: Community Forums
308: Community Forums
309: Community Forums
310: Downloads
311: Photo Gallery
312: Community Forums
313: Photo Gallery
314: Photo Gallery
315: Photo Gallery
316: Community Forums
317: Home
318: Your Account
319: Community Forums
320: CPGlang
321: Your Account
322: Community Forums
323: Photo Gallery
324: Community Forums
325: Community Forums
326: Home
327: Community Forums
328: Photo Gallery
329: Photo Gallery
330: Downloads
331: Community Forums
332: CPGlang
333: Community Forums
334: Your Account
335: News
336: Community Forums
337: Community Forums
338: Member Screenshots
339: Home
340: Community Forums
341: Your Account
342: CPGlang
343: Photo Gallery
344: Downloads
345: Community Forums
346: Home
347: Photo Gallery
348: Community Forums
349: Community Forums
350: Downloads
351: Home
352: Community Forums
353: Photo Gallery
354: Photo Gallery
355: Community Forums
356: Community Forums
357: Downloads
358: Downloads
359: Community Forums
360: Community Forums
361: Community Forums
362: Photo Gallery
363: Community Forums
364: Community Forums
365: Home
366: Downloads
367: Member Screenshots
368: Home
369: Community Forums
370: Community Forums
371: Community Forums
372: Photo Gallery
373: Downloads
374: Community Forums
375: Member Screenshots
376: Community Forums
377: Community Forums
378: Community Forums
379: Home
380: Photo Gallery
381: Community Forums
382: Community Forums
383: Downloads
384: Community Forums
385: Member Screenshots
386: Home
387: Community Forums
388: Community Forums
389: Community Forums
390: Community Forums
391: Downloads
392: Community Forums
393: Photo Gallery
394: Community Forums
395: Photo Gallery
396: Community Forums
397: Photo Gallery
398: Community Forums
399: Community Forums
400: Photo Gallery
401: Photo Gallery
402: Photo Gallery
403: Home
404: Community Forums
405: Downloads
406: Photo Gallery
407: Downloads
408: Photo Gallery
409: Your Account
410: Downloads
411: Member Screenshots
412: Community Forums
413: Community Forums
414: Home
415: Community Forums
416: CPGlang
417: Community Forums
418: Photo Gallery
419: Photo Gallery
420: Community Forums
421: Photo Gallery
422: Community Forums
423: Community Forums
424: Community Forums
425: Home
426: Photo Gallery
427: Community Forums
428: Photo Gallery
429: Photo Gallery
430: Photo Gallery
431: Member Screenshots
432: Photo Gallery
433: Community Forums
434: Community Forums
435: Community Forums
436: Photo Gallery
437: Downloads
438: Community Forums
439: Community Forums
440: Community Forums
441: Community Forums
442: Community Forums
443: Downloads
444: Downloads
445: Community Forums
446: Community Forums
447: Home
448: Community Forums
449: Community Forums
450: Community Forums
451: Photo Gallery
452: Community Forums
453: Downloads
454: Community Forums
455: Community Forums
456: Home
457: Community Forums
458: Home
459: Community Forums
460: Community Forums
461: Community Forums
462: Photo Gallery
463: Community Forums
464: Home
465: Community Forums
466: Community Forums
467: Photo Gallery
468: Community Forums
469: Community Forums
470: Community Forums
471: Community Forums
472: Community Forums
473: Photo Gallery
474: Home
475: Community Forums
476: Community Forums
477: Community Forums
478: Photo Gallery
479: Community Forums
480: Photo Gallery
481: Photo Gallery
482: Community Forums
483: Photo Gallery
484: Home
485: Community Forums
486: Community Forums
487: Photo Gallery
488: Community Forums
489: Community Forums
490: Member Screenshots
491: Community Forums
492: CPGlang
493: Community Forums
494: Community Forums
495: Photo Gallery
496: Community Forums
497: Photo Gallery
498: Community Forums
499: Community Forums
500: Community Forums
501: Community Forums
502: Community Forums
503: Community Forums
504: Community Forums
505: News
506: Photo Gallery
507: Community Forums
508: CPGlang
509: CPGlang
510: Community Forums
511: Community Forums
512: Photo Gallery
513: Community Forums
514: Community Forums
515: Community Forums
516: Downloads
517: Home
518: Community Forums
519: Community Forums
520: Community Forums
521: Community Forums
522: Community Forums
523: Community Forums
524: Community Forums
525: Member Screenshots
526: Community Forums
527: Community Forums
528: Your Account
529: CPGlang
530: Photo Gallery
531: Community Forums
532: Home
533: Community Forums
534: Home
535: Photo Gallery
536: Community Forums
537: Downloads
538: Community Forums
539: Community Forums
540: Community Forums
541: Community Forums
542: Community Forums
543: Member Screenshots
544: Photo Gallery
545: Community Forums
546: Community Forums
547: Community Forums
548: Community Forums
549: Community Forums
550: Community Forums
551: Your Account
552: Photo Gallery
553: Photo Gallery
554: Community Forums
555: Community Forums
556: Home
557: Photo Gallery
558: Photo Gallery
559: Photo Gallery
560: Photo Gallery
561: Community Forums
562: Community Forums
563: Photo Gallery
564: Photo Gallery
565: Home
566: News
567: Community Forums
568: Community Forums
569: CPGlang
570: Community Forums
571: Member Screenshots
572: Downloads
573: Community Forums
574: Community Forums
575: Community Forums
576: Photo Gallery
577: Community Forums
578: Home
579: Community Forums
580: Community Forums
581: Community Forums
582: Community Forums
583: News
584: Statistics
585: Community Forums
586: Community Forums
587: Community Forums
588: Community Forums
589: Community Forums
590: Community Forums
591: News
592: Community Forums
593: Home
594: Community Forums
595: Community Forums
596: Community Forums
597: Community Forums
598: Community Forums
599: Community Forums
600: Community Forums
601: Community Forums
602: Photo Gallery
603: Community Forums
604: Community Forums
605: Community Forums
606: Community Forums
607: Photo Gallery
608: Downloads
609: Your Account
610: Community Forums
611: Community Forums
612: Community Forums
613: Community Forums
614: Downloads
615: Photo Gallery
616: Community Forums
617: Community Forums
618: Photo Gallery
619: Home
620: Photo Gallery
621: Community Forums
622: Downloads
623: Statistics
624: Community Forums
625: Community Forums
626: Community Forums
627: Community Forums
628: Community Forums
629: Photo Gallery
630: Home
631: Home
632: Community Forums
633: Community Forums
634: Community Forums
635: Photo Gallery
636: Community Forums
637: Photo Gallery
638: Photo Gallery
639: Community Forums
640: Photo Gallery
641: Community Forums
642: Community Forums
643: Community Forums
644: Photo Gallery
645: Community Forums
646: Downloads
647: Photo Gallery
648: Community Forums
649: Photo Gallery
650: Photo Gallery
651: Community Forums
652: Photo Gallery
653: Photo Gallery
654: Photo Gallery
655: Community Forums
656: Home
657: Photo Gallery
658: Downloads
659: Community Forums
660: Photo Gallery
661: Community Forums
662: Community Forums
663: Photo Gallery
664: Community Forums
665: Community Forums
666: Community Forums
667: Downloads
668: Community Forums
669: Photo Gallery
670: Community Forums
671: Downloads
672: Photo Gallery
673: Community Forums
674: Community Forums
675: Community Forums
676: Member Screenshots
677: Photo Gallery
678: Community Forums
679: Community Forums
680: Community Forums
681: Community Forums
682: Community Forums
683: Your Account
684: Downloads
685: Community Forums
686: Photo Gallery
687: Community Forums
688: Community Forums
689: Community Forums
690: Home
691: Downloads
692: Community Forums
693: Community Forums
694: Community Forums
695: Downloads
696: Community Forums
697: Community Forums
698: Photo Gallery
699: CPGlang
700: Community Forums
701: Community Forums
702: Community Forums
703: Community Forums
704: Community Forums
705: Your Account
706: Community Forums
707: Community Forums
708: Photo Gallery
709: Community Forums
710: Community Forums
711: Home
712: Photo Gallery
713: Downloads
714: Community Forums
715: Community Forums
716: Community Forums
717: Statistics
718: Community Forums
719: Community Forums
720: Community Forums
721: Community Forums
722: Your Account
723: Photo Gallery
724: Home
725: Home
726: Community Forums
727: Photo Gallery
728: Community Forums
729: Community Forums
730: Photo Gallery
731: Community Forums
732: Your Account
733: News
734: Community Forums
735: News
736: Community Forums
737: Home
738: Community Forums
739: Photo Gallery
740: Downloads
741: Photo Gallery
742: Photo Gallery
743: Community Forums
744: Home
745: Photo Gallery
746: Photo Gallery
747: Community Forums
748: Community Forums
749: Photo Gallery
750: Photo Gallery
751: Photo Gallery
752: Community Forums
753: Home
754: Photo Gallery
755: Photo Gallery
756: Downloads
757: Community Forums
758: Photo Gallery
759: Community Forums
760: Photo Gallery
761: Community Forums
762: Photo Gallery
763: Community Forums
764: Photo Gallery
765: Community Forums
766: Community Forums
767: Community Forums
768: Community Forums
769: Photo Gallery
770: Community Forums
771: Community Forums
772: Photo Gallery
773: Photo Gallery
774: Downloads
775: Community Forums
776: CPGlang
777: Home
778: Home
779: Community Forums
780: Community Forums
781: Community Forums
782: Home
783: Community Forums
784: Photo Gallery
785: Community Forums
786: Community Forums
787: News Archive
788: Community Forums
789: Community Forums
790: Photo Gallery
791: Downloads
792: Photo Gallery
793: Community Forums
794: Photo Gallery
795: Community Forums
796: Community Forums
797: Community Forums
798: Community Forums
799: Community Forums
800: Community Forums
801: Photo Gallery
802: Community Forums
803: Community Forums
804: Member Screenshots
805: Photo Gallery
806: Community Forums
807: Home
808: Photo Gallery
809: CPGlang
810: Community Forums
811: Photo Gallery
812: Photo Gallery
813: Home
814: Photo Gallery
815: Community Forums
816: Community Forums
817: Community Forums
818: Photo Gallery
819: Community Forums
820: Community Forums
821: Home
822: Community Forums
823: Home
824: Community Forums
825: Home
826: Statistics
827: Photo Gallery
828: Photo Gallery
829: Community Forums
830: Community Forums
831: Downloads
832: Home
833: Community Forums
834: Member Screenshots
835: Community Forums
836: Downloads
837: Community Forums
838: Community Forums
839: Photo Gallery
840: Your Account
841: Photo Gallery
842: Community Forums
843: Home
844: Community Forums
845: Community Forums
846: Community Forums
847: Downloads
848: Community Forums
849: Community Forums
850: Member Screenshots
851: Community Forums
852: Community Forums
853: News Archive
854: Community Forums
855: Community Forums
856: Home
857: Community Forums
858: Community Forums
859: Photo Gallery
860: Home
861: Photo Gallery
862: Home
863: Community Forums
864: Photo Gallery
865: Community Forums
866: Photo Gallery
867: Community Forums
868: Community Forums
869: Home
870: Community Forums
871: Community Forums
872: Home
873: Community Forums
874: Photo Gallery
875: Community Forums
876: Community Forums
877: Home
878: Community Forums
879: Photo Gallery
880: Photo Gallery
881: Community Forums
882: Photo Gallery
883: Downloads
884: Community Forums
885: Community Forums
886: Community Forums

Staff Online:

No staff members are online!
This looks like a bad one! :: Archived
Resolve issues with your computer problems here or read about the latest computer parts and information.
Post new topic    Revive this topic    Printer Friendly Page     Forum Index ›  Hardware

Topic Archived View previous topic :: View next topic  
Author Message
JG300-Ascout
Power User

Offline Offline
Joined: Jan 05, 2005
Posts: 6257
Location: Cyberspace
PostPosted: Sun Jan 01, 2006 5:53 pm
Post subject: This looks like a bad one!

www.foxnews.com/story/...44,00.html

Advice on impementing the fix from y'all?
__________________________________________________________
'Extremely Critical Flaw' in Windows Discovered, Already Exploited
Friday, December 30, 2005
By Lisa Vaas




Microsoft Corp. has issued a security advisory for what Secunia is deeming an "extremely critical flaw" in Windows Metafile Format (.wmf) that is now being exploited on fully patched systems by malicious attackers.
Websense Security Labs is tracking thousands of sites distributing the exploit code from a site called iFrameCASH BUSINESS.
That site and numerous others are distributing spyware and other unwanted software, replacing users' desktop backgrounds with a message that warns of spyware infection and which prompts the user to enter credit card information to pay for a "spyware cleaning" application to remove the detected spyware.
Vulnerable operating systems include a slew of Windows Server 2003 editions: Datacenter Edition, Enterprise Edition, Standard Edition and Web Edition.
Also at risk are Windows XP Home Edition and Windows XP Professional, making both home users and businesses open to attack.
In this fluid attack, researchers have kept up a steady stream of new details about the extent of the exploit's reach, with Google Desktop being the latest reported vector.
F-Secure reported on Wednesday that Google Desktop tries to index image files with the exploit, executing it in the process. F-Secure reports that this exploitation-via-indexing may wind up occurring with other desktop search engines as well.
(Story continues below)


Google had no immediate comment. To avoid the problem, security experts suggest disabling the feature's indexing of media files, or to remove Google Desktop altogether.
A workaround called REGSVR32 has been posted and was included in Microsoft's advisory. However, it should be noted that as of Thursday evening, some security researchers were reporting that the workaround is not fully successful.
The workaround is as follows, as quoted from the advisory:
Un-register the Windows Picture and Fax Viewer (Shimgvw.dll)
1. Click Start, click Run, type "regsvr32 -u %windir%system32shimgvw.dll" (without the quotation marks), and then click OK.
2. A dialog box appears to confirm that the un-registration process has succeeded.
� Click OK to close the dialog box.
Impact of Workaround: The Windows Picture and Fax Viewer will no longer be started when users click on a link to an image type that is associated with the Windows Picture and Fax Viewer.
To undo this change, re-register Shimgvw.dll by following the above steps. Replace the text in Step 1 with "regsvr32 %windir%system32shimgvw.dll" (without the quotation marks).
F-Secure notes that this workaround beats filtering .wmf files, given that files with other image extensions � such as BMP, GIF, JPG, JPEG, TIFF, etc. � can be used to exploit machines.
F-Secure also recommends filtering domains at corporate firewalls. These sites should be listed as off-limits:
toolbarbiz.business
toolbarsite.biz
toolbartraff.biz
toolbarurl.biz
buytoolbar.biz
buytraff.biz
iframebiz.biz
iframecash.biz
iframesite.biz
iframetraff.biz
iframeurl.business
F-Secure notes that it's seen 57 versions of this malicious .wmf file exploit as of Thursday, detected as PFV-Exploit.
The security firm is predicting that, even though the exploit has only been used to install spyware or fake antispyware/antivirus software thus far, it anticipates that real viruses will start to spread soon.
According to the Sunbelt Software blog, "any application that automatically displays a WMF image" can be a vector for infection, including older versions of Firefox, current versions of Opera, Outlook and all current versions of Internet Explorer on all Windows versions.
"This is a zero-day exploit, the kind that give security researchers cold chills," according to Sunbelt's blog. "You can get infected by simply viewing an infected WMF image."
According to F-Secure, Trojan downloaders are taking advantage of the vulnerability to install Trojan-Downloader.Win32.Agent.abs, Trojan-Dropper.Win32.Small.zp, Trojan.Win32.Small.ga and Trojan.Win32.Small.ev.
F-Secure also reports that some of the Trojans install hoax anti-malware programs such as Avgold.
F-Secure traced the exploit to Russian sites, one of which is allegedly registered to former Soviet Union President Mikhail Gorbachev.
Sunbelt warns that users are likely to get infected by being directed to one of the sites via spam that offer dirty pictures, free software or other bait.
The attack works by tricking users into opening malicious ".wmf" files in "Windows Picture and Fax Viewer" or by previewing such a file by selecting it in Windows Explorer. The attack can also be triggered automatically when visiting malicious Web sites via Internet Explorer.
Although Secunia deemed the flaw highly critical, at least one security researcher was dismissive of the bug's severity.
Pete Lindstrom, research director for Spire Security LLC, said that at this stage in the game, anything that requires user interaction is hardly worth notice.
"There's no such thing as 'extremely critical' when user interaction is required," Lindstrom said. "That's just silly."
But as far as using IE goes, download of malicious software is automatic, happening immediately upon going to the site, pointed out Alex Eckelberry, president of Sunbelt Software.
"There is no user interaction required," he wrote in an e-mail exchange. "You hit the Web site, you get hit immediately. No prompts, nothing."
John Pescatore, an analyst with Gartner Inc., said that this type of attack may be slowed down by requiring users to click on a malicious .wmf file or to go to a malicious Web site, but that doesn't mean it won't spread fast, given users' willingness to click on bait.
"One of these [attacks] where clicking on a URL [is involved], those can spread pretty fast," he said, given users' proclivity to click away.
"We do online consumer studies. Two years ago, 30 percent had fallen for phishing [schemes]. They entered their user name, password or credit card information. This year, many fewer completely fell for them, but they still clicked on the link in the phishing e-mail."
Given the rise of keystroke loggers that can automatically be downloaded onto a user's system after the user visits a malicious site, that means the Web-surfing population is still ripe for phishing, Pescatore said.
"They're still clicking on links, and whenever malicious software gets installed, that's when you get a critical rating, because all sorts of bad things can happen."
According to Secunia, the vulnerability is caused by an error in handling corrupted .wmf files � a graphics file format used to exchange graphics information between Microsoft Windows applications that can hold vector and bit-mapped images.
Secunia confirmed the vulnerability on a fully patched system running Windows XP SP2. The advisory said that Windows Server 2003 SP0 and SP1 systems have also reportedly been affected.
A Microsoft spokesman told eWEEK in an e-mail exchange on Wednesday that Microsoft "is investigating new public reports of a possible vulnerability in Windows," although he didn't give an ETA for a patch.
"Microsoft will continue to investigate the public reports to help provide additional guidance for customers," he said. "Upon completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a fix through our monthly release process or issuing a security advisory, depending on customer needs."
The spokesman went on to encourage customers to follow Microsoft's Protect Your PC guidelines of enabling a firewall, getting software updates and installing anti-virus software.
Customers who think they've been affected can also contact Product Support Services, which is at 1-866-PCSAFETY in North America or at support.microsoft.com/security for outside North America.
Microsoft also advises customers who think they've been attacked to contact their local FBI office or to post the incident on www.ifccfbi.gov. Customers outside the United States should contact the national law enforcement agency in their country, the spokesman said.
The advisory issued by Microsoft later on Wednesday said that Microsoft is aware of the code, which allows an attacker "to execute arbitrary code in the security context of the logged-on user, when such user is visiting a Web site that contains a specially crafted Windows Metafile (WMF) image."
Microsoft's advisory echoed Lindstrom's take, however, stating that attackers have "no way to force users to visit a malicious Web site."
Instead, the advisory continued, attackers have to persuade users to visit the sites, "typically by getting them to click a link that takes them to the attacker's Web site."
The advisory said that Microsoft would either be issuing a patch through its monthly release process or would provide an out-of-cycle security update, "depending on customer needs."
Microsoft's spokesman declined to state how many customers had reported that they had been victimized by the attack.
Secunia advised that users avoid opening or previewing untrusted .wmf files, as well as set security level to "High" in IE.
Lindstrom noted that the long-term answer to dealing with what he called this type of "flotsam and jetsam" of constant security alerts is to install host intrusion prevention software to designate what software is allowed to run on a system and what it's allowed to do.
As far as the short-term response to this particular vulnerability goes, Lindstrom echoed Secunia's advisory when it comes to untrusted files: "Don't click on it," he said.
Editor's Note: This story was updated to include Microsoft's statement, more on the recommended workaround and more details about the exploit from Sunbelt and F-Secure.

_________________
"All facts go to clearly prove that Shades is a thrice-cursed traitor & mentally deranged person steeped in inveterate enmity toward mankind"
Back to top
View user's profile Photo Gallery
Shadow_Bshwackr
Janitor

Offline Offline
Joined: Jan 21, 2005
Posts: 7015
Location: Central Illinois, USA
PostPosted: Wed Jan 04, 2006 11:51 am
Post subject: Re: This looks like a bad one!

Thanks for the heads up on this one Ascout! I don't know about anyone else, but I like and use WMP quite often... Wink
Back to top
View user's profile Visit poster's website Photo Gallery
Display posts from previous:   
Post new topic    Revive this topic    Printer Friendly Page    Forum Index ›  Hardware
Page 1 of 1
All times are GMT - 6 Hours

Archive Revive
Username:
This is an archived topic - your reply will not be appended here.
Instead, a new topic will be generated in the active forum.
The new topic will provide a reference link to this archived topic.