±Recent Visitors

Recent Visitors to Com-Central!

±User Info-big


Welcome Anonymous

Nickname
Password

Membership:
Latest: HighestAce
New Today: 0
New Yesterday: 0
Overall: 6648

People Online:
Members: 0
Visitors: 647
Total: 647
Who Is Where:
 Visitors:
01: Home
02: Home
03: Photo Gallery
04: Home
05: Home
06: Photo Gallery
07: Home
08: Home
09: Home
10: Home
11: Home
12: Home
13: Home
14: Home
15: Home
16: Home
17: Home
18: Home
19: Home
20: Home
21: Home
22: Home
23: Home
24: Home
25: Home
26: Home
27: Home
28: Home
29: Community Forums
30: Home
31: Home
32: Home
33: Home
34: Home
35: Home
36: Home
37: Home
38: Home
39: Community Forums
40: Home
41: Home
42: Home
43: Member Screenshots
44: Home
45: Home
46: Home
47: Home
48: Home
49: Home
50: Home
51: Home
52: Home
53: Home
54: Home
55: Community Forums
56: Home
57: Home
58: Home
59: Home
60: Home
61: Home
62: Home
63: Home
64: Home
65: Home
66: Home
67: Home
68: Home
69: Home
70: Community Forums
71: Home
72: Home
73: Home
74: Home
75: Home
76: Home
77: Home
78: Home
79: Home
80: Home
81: Home
82: Home
83: Home
84: Home
85: Home
86: Home
87: Home
88: Home
89: Home
90: Home
91: Home
92: Home
93: Home
94: Home
95: Home
96: Home
97: Home
98: Home
99: Home
100: Home
101: Home
102: Home
103: Home
104: Home
105: Home
106: Home
107: Home
108: Home
109: Home
110: Home
111: Community Forums
112: Home
113: Home
114: Member Screenshots
115: Community Forums
116: Your Account
117: Home
118: Home
119: Home
120: Home
121: Home
122: Home
123: Home
124: Home
125: Home
126: Home
127: Home
128: Community Forums
129: Home
130: Home
131: Home
132: Home
133: Home
134: Home
135: Home
136: Home
137: Home
138: Home
139: Member Screenshots
140: Home
141: Home
142: Home
143: Home
144: Home
145: Home
146: Home
147: Home
148: Home
149: Home
150: Home
151: Home
152: Home
153: Home
154: Home
155: Home
156: Home
157: Home
158: Home
159: Home
160: Community Forums
161: Home
162: Home
163: Home
164: Home
165: Home
166: Home
167: Home
168: Home
169: Home
170: Home
171: Home
172: Home
173: Home
174: Home
175: Home
176: Home
177: Home
178: Member Screenshots
179: Home
180: Home
181: Community Forums
182: Community Forums
183: Home
184: Home
185: Home
186: Community Forums
187: Community Forums
188: Downloads
189: Member Screenshots
190: Community Forums
191: Home
192: Community Forums
193: Community Forums
194: Community Forums
195: Member Screenshots
196: Community Forums
197: Community Forums
198: Home
199: Community Forums
200: Home
201: Community Forums
202: Community Forums
203: Home
204: Member Screenshots
205: Home
206: Member Screenshots
207: Home
208: Photo Gallery
209: Home
210: Community Forums
211: Member Screenshots
212: Community Forums
213: Community Forums
214: Your Account
215: Community Forums
216: Community Forums
217: Community Forums
218: Home
219: Community Forums
220: Home
221: Community Forums
222: Downloads
223: Home
224: Home
225: Home
226: Home
227: Home
228: Community Forums
229: Home
230: Home
231: Home
232: Home
233: Home
234: Home
235: Home
236: Home
237: Home
238: Home
239: Home
240: Home
241: Home
242: Home
243: Home
244: Home
245: Home
246: Home
247: Home
248: Home
249: Home
250: Home
251: Home
252: Home
253: Member Screenshots
254: Home
255: Home
256: Home
257: Home
258: Home
259: Home
260: Home
261: Home
262: Home
263: Home
264: Home
265: Home
266: Home
267: Home
268: Home
269: Home
270: Community Forums
271: Home
272: Home
273: Home
274: Home
275: Home
276: Home
277: Home
278: Home
279: Home
280: Home
281: Home
282: Home
283: Home
284: Home
285: Home
286: Home
287: Home
288: Home
289: Home
290: Home
291: Home
292: Home
293: Home
294: Home
295: Home
296: Home
297: Home
298: Home
299: Home
300: Home
301: Home
302: Community Forums
303: Home
304: Community Forums
305: Community Forums
306: Home
307: Home
308: Community Forums
309: Member Screenshots
310: Home
311: Home
312: Home
313: Home
314: Home
315: Home
316: Home
317: Home
318: Home
319: Home
320: Home
321: Home
322: Home
323: Home
324: Home
325: Home
326: Home
327: Home
328: Home
329: Home
330: Home
331: Home
332: Home
333: Home
334: Community Forums
335: Home
336: Home
337: Home
338: Home
339: Home
340: Home
341: Home
342: Home
343: Home
344: Home
345: Home
346: Home
347: Home
348: Home
349: Community Forums
350: Home
351: Home
352: Member Screenshots
353: Home
354: Home
355: Community Forums
356: Home
357: Community Forums
358: Home
359: Community Forums
360: Home
361: Your Account
362: Home
363: Home
364: Your Account
365: Community Forums
366: Member Screenshots
367: Home
368: Community Forums
369: Community Forums
370: Community Forums
371: Home
372: Home
373: Community Forums
374: Your Account
375: Home
376: Downloads
377: Home
378: Home
379: Community Forums
380: Community Forums
381: Community Forums
382: Member Screenshots
383: Community Forums
384: Home
385: Community Forums
386: Member Screenshots
387: Community Forums
388: Home
389: Community Forums
390: Home
391: Home
392: Community Forums
393: Home
394: Home
395: Community Forums
396: Home
397: Home
398: Member Screenshots
399: Home
400: Home
401: Home
402: Home
403: Home
404: Home
405: Home
406: Home
407: Home
408: Home
409: Home
410: Home
411: Home
412: Home
413: Home
414: Home
415: Home
416: Home
417: Home
418: Home
419: Downloads
420: Home
421: Home
422: Home
423: Home
424: Member Screenshots
425: Home
426: Home
427: Home
428: Home
429: Home
430: Home
431: Home
432: Home
433: Home
434: Home
435: Home
436: Home
437: Home
438: Home
439: Home
440: Home
441: Home
442: Home
443: Community Forums
444: Home
445: Home
446: Home
447: Home
448: Home
449: Home
450: Home
451: Home
452: Home
453: Home
454: Home
455: Home
456: Home
457: Home
458: Home
459: Home
460: Home
461: Home
462: Home
463: Home
464: Home
465: Home
466: Home
467: Community Forums
468: Home
469: Community Forums
470: Home
471: Community Forums
472: Home
473: Community Forums
474: Home
475: Home
476: Home
477: Home
478: Home
479: Home
480: Home
481: Home
482: Home
483: Home
484: Home
485: Home
486: Home
487: Home
488: Home
489: Home
490: Home
491: Home
492: Home
493: Home
494: Home
495: Home
496: Home
497: Home
498: Home
499: Home
500: Home
501: Home
502: Home
503: Home
504: Home
505: Home
506: Home
507: Home
508: Home
509: Home
510: Home
511: Home
512: Home
513: Home
514: Home
515: Home
516: Home
517: Home
518: Home
519: Home
520: Home
521: Home
522: Home
523: Home
524: Home
525: Home
526: Home
527: Home
528: Home
529: Home
530: Member Screenshots
531: Community Forums
532: Community Forums
533: Community Forums
534: Community Forums
535: Home
536: Home
537: Community Forums
538: Home
539: Community Forums
540: Downloads
541: Community Forums
542: Community Forums
543: Home
544: Member Screenshots
545: Community Forums
546: Home
547: Community Forums
548: Home
549: News Archive
550: Community Forums
551: Community Forums
552: Community Forums
553: Home
554: Community Forums
555: Member Screenshots
556: Community Forums
557: News
558: Member Screenshots
559: Community Forums
560: Community Forums
561: Community Forums
562: Community Forums
563: Community Forums
564: Community Forums
565: Home
566: Home
567: Home
568: Home
569: Downloads
570: Statistics
571: Community Forums
572: Home
573: Home
574: Home
575: Member Screenshots
576: Home
577: Home
578: Home
579: Community Forums
580: Home
581: Home
582: Home
583: Home
584: Home
585: Home
586: Home
587: Community Forums
588: Home
589: Home
590: Home
591: Member Screenshots
592: Home
593: Home
594: Home
595: Home
596: Home
597: Home
598: Home
599: Home
600: Home
601: Home
602: Home
603: Home
604: Community Forums
605: Home
606: Home
607: Community Forums
608: Community Forums
609: Downloads
610: Home
611: Community Forums
612: Home
613: Community Forums
614: Home
615: Community Forums
616: Member Screenshots
617: Community Forums
618: Home
619: Downloads
620: Community Forums
621: Home
622: Community Forums
623: Downloads
624: Home
625: Home
626: Home
627: Home
628: Community Forums
629: Home
630: Member Screenshots
631: Photo Gallery
632: Community Forums
633: Home
634: Home
635: Home
636: Community Forums
637: Community Forums
638: Home
639: Home
640: Community Forums
641: Home
642: Home
643: Community Forums
644: Home
645: Home
646: Community Forums
647: Home

Staff Online:

No staff members are online!
This looks like a bad one! :: Archived
Resolve issues with your computer problems here or read about the latest computer parts and information.
Post new topic    Revive this topic    Printer Friendly Page     Forum Index ›  Hardware

Topic Archived View previous topic :: View next topic  
Author Message
JG300-Ascout
Power User

Offline Offline
Joined: Jan 05, 2005
Posts: 6257
Location: Cyberspace
PostPosted: Sun Jan 01, 2006 5:53 pm
Post subject: This looks like a bad one!

www.foxnews.com/story/...44,00.html

Advice on impementing the fix from y'all?
__________________________________________________________
'Extremely Critical Flaw' in Windows Discovered, Already Exploited
Friday, December 30, 2005
By Lisa Vaas




Microsoft Corp. has issued a security advisory for what Secunia is deeming an "extremely critical flaw" in Windows Metafile Format (.wmf) that is now being exploited on fully patched systems by malicious attackers.
Websense Security Labs is tracking thousands of sites distributing the exploit code from a site called iFrameCASH BUSINESS.
That site and numerous others are distributing spyware and other unwanted software, replacing users' desktop backgrounds with a message that warns of spyware infection and which prompts the user to enter credit card information to pay for a "spyware cleaning" application to remove the detected spyware.
Vulnerable operating systems include a slew of Windows Server 2003 editions: Datacenter Edition, Enterprise Edition, Standard Edition and Web Edition.
Also at risk are Windows XP Home Edition and Windows XP Professional, making both home users and businesses open to attack.
In this fluid attack, researchers have kept up a steady stream of new details about the extent of the exploit's reach, with Google Desktop being the latest reported vector.
F-Secure reported on Wednesday that Google Desktop tries to index image files with the exploit, executing it in the process. F-Secure reports that this exploitation-via-indexing may wind up occurring with other desktop search engines as well.
(Story continues below)


Google had no immediate comment. To avoid the problem, security experts suggest disabling the feature's indexing of media files, or to remove Google Desktop altogether.
A workaround called REGSVR32 has been posted and was included in Microsoft's advisory. However, it should be noted that as of Thursday evening, some security researchers were reporting that the workaround is not fully successful.
The workaround is as follows, as quoted from the advisory:
Un-register the Windows Picture and Fax Viewer (Shimgvw.dll)
1. Click Start, click Run, type "regsvr32 -u %windir%system32shimgvw.dll" (without the quotation marks), and then click OK.
2. A dialog box appears to confirm that the un-registration process has succeeded.
� Click OK to close the dialog box.
Impact of Workaround: The Windows Picture and Fax Viewer will no longer be started when users click on a link to an image type that is associated with the Windows Picture and Fax Viewer.
To undo this change, re-register Shimgvw.dll by following the above steps. Replace the text in Step 1 with "regsvr32 %windir%system32shimgvw.dll" (without the quotation marks).
F-Secure notes that this workaround beats filtering .wmf files, given that files with other image extensions � such as BMP, GIF, JPG, JPEG, TIFF, etc. � can be used to exploit machines.
F-Secure also recommends filtering domains at corporate firewalls. These sites should be listed as off-limits:
toolbarbiz.business
toolbarsite.biz
toolbartraff.biz
toolbarurl.biz
buytoolbar.biz
buytraff.biz
iframebiz.biz
iframecash.biz
iframesite.biz
iframetraff.biz
iframeurl.business
F-Secure notes that it's seen 57 versions of this malicious .wmf file exploit as of Thursday, detected as PFV-Exploit.
The security firm is predicting that, even though the exploit has only been used to install spyware or fake antispyware/antivirus software thus far, it anticipates that real viruses will start to spread soon.
According to the Sunbelt Software blog, "any application that automatically displays a WMF image" can be a vector for infection, including older versions of Firefox, current versions of Opera, Outlook and all current versions of Internet Explorer on all Windows versions.
"This is a zero-day exploit, the kind that give security researchers cold chills," according to Sunbelt's blog. "You can get infected by simply viewing an infected WMF image."
According to F-Secure, Trojan downloaders are taking advantage of the vulnerability to install Trojan-Downloader.Win32.Agent.abs, Trojan-Dropper.Win32.Small.zp, Trojan.Win32.Small.ga and Trojan.Win32.Small.ev.
F-Secure also reports that some of the Trojans install hoax anti-malware programs such as Avgold.
F-Secure traced the exploit to Russian sites, one of which is allegedly registered to former Soviet Union President Mikhail Gorbachev.
Sunbelt warns that users are likely to get infected by being directed to one of the sites via spam that offer dirty pictures, free software or other bait.
The attack works by tricking users into opening malicious ".wmf" files in "Windows Picture and Fax Viewer" or by previewing such a file by selecting it in Windows Explorer. The attack can also be triggered automatically when visiting malicious Web sites via Internet Explorer.
Although Secunia deemed the flaw highly critical, at least one security researcher was dismissive of the bug's severity.
Pete Lindstrom, research director for Spire Security LLC, said that at this stage in the game, anything that requires user interaction is hardly worth notice.
"There's no such thing as 'extremely critical' when user interaction is required," Lindstrom said. "That's just silly."
But as far as using IE goes, download of malicious software is automatic, happening immediately upon going to the site, pointed out Alex Eckelberry, president of Sunbelt Software.
"There is no user interaction required," he wrote in an e-mail exchange. "You hit the Web site, you get hit immediately. No prompts, nothing."
John Pescatore, an analyst with Gartner Inc., said that this type of attack may be slowed down by requiring users to click on a malicious .wmf file or to go to a malicious Web site, but that doesn't mean it won't spread fast, given users' willingness to click on bait.
"One of these [attacks] where clicking on a URL [is involved], those can spread pretty fast," he said, given users' proclivity to click away.
"We do online consumer studies. Two years ago, 30 percent had fallen for phishing [schemes]. They entered their user name, password or credit card information. This year, many fewer completely fell for them, but they still clicked on the link in the phishing e-mail."
Given the rise of keystroke loggers that can automatically be downloaded onto a user's system after the user visits a malicious site, that means the Web-surfing population is still ripe for phishing, Pescatore said.
"They're still clicking on links, and whenever malicious software gets installed, that's when you get a critical rating, because all sorts of bad things can happen."
According to Secunia, the vulnerability is caused by an error in handling corrupted .wmf files � a graphics file format used to exchange graphics information between Microsoft Windows applications that can hold vector and bit-mapped images.
Secunia confirmed the vulnerability on a fully patched system running Windows XP SP2. The advisory said that Windows Server 2003 SP0 and SP1 systems have also reportedly been affected.
A Microsoft spokesman told eWEEK in an e-mail exchange on Wednesday that Microsoft "is investigating new public reports of a possible vulnerability in Windows," although he didn't give an ETA for a patch.
"Microsoft will continue to investigate the public reports to help provide additional guidance for customers," he said. "Upon completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a fix through our monthly release process or issuing a security advisory, depending on customer needs."
The spokesman went on to encourage customers to follow Microsoft's Protect Your PC guidelines of enabling a firewall, getting software updates and installing anti-virus software.
Customers who think they've been affected can also contact Product Support Services, which is at 1-866-PCSAFETY in North America or at support.microsoft.com/security for outside North America.
Microsoft also advises customers who think they've been attacked to contact their local FBI office or to post the incident on www.ifccfbi.gov. Customers outside the United States should contact the national law enforcement agency in their country, the spokesman said.
The advisory issued by Microsoft later on Wednesday said that Microsoft is aware of the code, which allows an attacker "to execute arbitrary code in the security context of the logged-on user, when such user is visiting a Web site that contains a specially crafted Windows Metafile (WMF) image."
Microsoft's advisory echoed Lindstrom's take, however, stating that attackers have "no way to force users to visit a malicious Web site."
Instead, the advisory continued, attackers have to persuade users to visit the sites, "typically by getting them to click a link that takes them to the attacker's Web site."
The advisory said that Microsoft would either be issuing a patch through its monthly release process or would provide an out-of-cycle security update, "depending on customer needs."
Microsoft's spokesman declined to state how many customers had reported that they had been victimized by the attack.
Secunia advised that users avoid opening or previewing untrusted .wmf files, as well as set security level to "High" in IE.
Lindstrom noted that the long-term answer to dealing with what he called this type of "flotsam and jetsam" of constant security alerts is to install host intrusion prevention software to designate what software is allowed to run on a system and what it's allowed to do.
As far as the short-term response to this particular vulnerability goes, Lindstrom echoed Secunia's advisory when it comes to untrusted files: "Don't click on it," he said.
Editor's Note: This story was updated to include Microsoft's statement, more on the recommended workaround and more details about the exploit from Sunbelt and F-Secure.

_________________
"All facts go to clearly prove that Shades is a thrice-cursed traitor & mentally deranged person steeped in inveterate enmity toward mankind"
Back to top
View user's profile Photo Gallery
Shadow_Bshwackr
Janitor

Offline Offline
Joined: Jan 21, 2005
Posts: 7019
Location: Central Illinois, USA
PostPosted: Wed Jan 04, 2006 11:51 am
Post subject: Re: This looks like a bad one!

Thanks for the heads up on this one Ascout! I don't know about anyone else, but I like and use WMP quite often... Wink
Back to top
View user's profile Visit poster's website Photo Gallery
Display posts from previous:   
Post new topic    Revive this topic    Printer Friendly Page    Forum Index ›  Hardware
Page 1 of 1
All times are GMT - 6 Hours

Archive Revive
Username:
This is an archived topic - your reply will not be appended here.
Instead, a new topic will be generated in the active forum.
The new topic will provide a reference link to this archived topic.