±Recent Visitors

Recent Visitors to Com-Central!

±User Info-big


Welcome Anonymous

Nickname
Password

Membership:
Latest: HighestAce
New Today: 0
New Yesterday: 0
Overall: 6648

People Online:
Members: 0
Visitors: 377
Total: 377
Who Is Where:
 Visitors:
01: Photo Gallery
02: Community Forums
03: Community Forums
04: Community Forums
05: Downloads
06: Downloads
07: Community Forums
08: Home
09: Community Forums
10: Community Forums
11: Community Forums
12: Community Forums
13: Downloads
14: Home
15: News Archive
16: Home
17: Community Forums
18: Community Forums
19: Community Forums
20: News
21: Community Forums
22: Community Forums
23: Community Forums
24: Community Forums
25: Community Forums
26: Community Forums
27: Community Forums
28: Community Forums
29: Community Forums
30: Community Forums
31: Home
32: Downloads
33: Photo Gallery
34: Community Forums
35: Community Forums
36: Downloads
37: Community Forums
38: Photo Gallery
39: Photo Gallery
40: Community Forums
41: Photo Gallery
42: Home
43: Photo Gallery
44: Community Forums
45: Community Forums
46: Community Forums
47: Community Forums
48: Photo Gallery
49: Community Forums
50: News Archive
51: Member Screenshots
52: Community Forums
53: Community Forums
54: Community Forums
55: Community Forums
56: Member Screenshots
57: Community Forums
58: News Archive
59: Community Forums
60: Home
61: Home
62: Community Forums
63: Photo Gallery
64: Community Forums
65: Community Forums
66: Home
67: Community Forums
68: Community Forums
69: Downloads
70: Home
71: Downloads
72: Home
73: Downloads
74: Member Screenshots
75: Community Forums
76: Community Forums
77: Community Forums
78: Photo Gallery
79: Your Account
80: Community Forums
81: Community Forums
82: Community Forums
83: Photo Gallery
84: Community Forums
85: News Archive
86: Home
87: Member Screenshots
88: Photo Gallery
89: Community Forums
90: Photo Gallery
91: Photo Gallery
92: Community Forums
93: Downloads
94: Downloads
95: Home
96: Community Forums
97: Community Forums
98: Community Forums
99: Member Screenshots
100: Home
101: Statistics
102: Downloads
103: Home
104: Community Forums
105: Community Forums
106: Photo Gallery
107: Statistics
108: Statistics
109: Photo Gallery
110: Community Forums
111: Community Forums
112: Home
113: Community Forums
114: Community Forums
115: Member Screenshots
116: Photo Gallery
117: Member Screenshots
118: Community Forums
119: Home
120: Community Forums
121: Member Screenshots
122: Community Forums
123: Home
124: Community Forums
125: Home
126: Community Forums
127: Community Forums
128: News Archive
129: Member Screenshots
130: Home
131: Community Forums
132: News Archive
133: Community Forums
134: Downloads
135: Home
136: Home
137: Community Forums
138: Community Forums
139: Home
140: Community Forums
141: Community Forums
142: News Archive
143: Community Forums
144: Photo Gallery
145: Photo Gallery
146: Photo Gallery
147: Member Screenshots
148: Community Forums
149: Member Screenshots
150: Downloads
151: Home
152: Community Forums
153: Downloads
154: Downloads
155: Community Forums
156: Photo Gallery
157: Community Forums
158: Community Forums
159: Home
160: News
161: Member Screenshots
162: Photo Gallery
163: Photo Gallery
164: Community Forums
165: Community Forums
166: News Archive
167: Downloads
168: Community Forums
169: Community Forums
170: Community Forums
171: Community Forums
172: Community Forums
173: Community Forums
174: Home
175: Community Forums
176: Member Screenshots
177: Photo Gallery
178: Home
179: Photo Gallery
180: News Archive
181: Community Forums
182: Home
183: Community Forums
184: Member Screenshots
185: Community Forums
186: Community Forums
187: Home
188: Photo Gallery
189: Member Screenshots
190: Community Forums
191: Home
192: Community Forums
193: Community Forums
194: Home
195: Home
196: Member Screenshots
197: Community Forums
198: Home
199: Member Screenshots
200: Community Forums
201: Community Forums
202: Community Forums
203: Member Screenshots
204: Home
205: Member Screenshots
206: Home
207: Member Screenshots
208: News Archive
209: Downloads
210: Community Forums
211: Photo Gallery
212: Community Forums
213: Community Forums
214: Home
215: Community Forums
216: Community Forums
217: Photo Gallery
218: Community Forums
219: Community Forums
220: Downloads
221: Community Forums
222: Photo Gallery
223: Home
224: Community Forums
225: News Archive
226: Photo Gallery
227: Community Forums
228: Community Forums
229: Community Forums
230: Member Screenshots
231: News
232: Community Forums
233: Community Forums
234: News Archive
235: Home
236: Community Forums
237: Home
238: Home
239: Community Forums
240: Community Forums
241: Photo Gallery
242: Photo Gallery
243: Home
244: Community Forums
245: Home
246: Community Forums
247: Statistics
248: Community Forums
249: Home
250: Photo Gallery
251: Community Forums
252: Community Forums
253: Home
254: Statistics
255: Community Forums
256: Community Forums
257: Community Forums
258: Member Screenshots
259: Community Forums
260: Community Forums
261: Community Forums
262: Community Forums
263: Community Forums
264: Home
265: Community Forums
266: Community Forums
267: Community Forums
268: Community Forums
269: Photo Gallery
270: Community Forums
271: Photo Gallery
272: Community Forums
273: Community Forums
274: Community Forums
275: Community Forums
276: Community Forums
277: Community Forums
278: Photo Gallery
279: Community Forums
280: Home
281: Member Screenshots
282: Downloads
283: Home
284: Downloads
285: News Archive
286: Photo Gallery
287: Community Forums
288: Home
289: Community Forums
290: Community Forums
291: Downloads
292: Community Forums
293: Community Forums
294: Photo Gallery
295: Community Forums
296: Community Forums
297: Home
298: Home
299: Home
300: Community Forums
301: Community Forums
302: Community Forums
303: News
304: Community Forums
305: Community Forums
306: Community Forums
307: Community Forums
308: Home
309: Home
310: Community Forums
311: Member Screenshots
312: Community Forums
313: Community Forums
314: Community Forums
315: Home
316: Downloads
317: Community Forums
318: Community Forums
319: Community Forums
320: Community Forums
321: Community Forums
322: Home
323: Community Forums
324: Community Forums
325: Community Forums
326: Community Forums
327: Home
328: Home
329: Community Forums
330: Community Forums
331: Community Forums
332: Community Forums
333: Community Forums
334: Home
335: Community Forums
336: Community Forums
337: Community Forums
338: Community Forums
339: Community Forums
340: Photo Gallery
341: Community Forums
342: Downloads
343: Community Forums
344: Community Forums
345: Community Forums
346: Community Forums
347: Home
348: Home
349: Downloads
350: Member Screenshots
351: Community Forums
352: Home
353: Community Forums
354: Community Forums
355: Home
356: Community Forums
357: Community Forums
358: News Archive
359: Community Forums
360: Community Forums
361: Community Forums
362: Your Account
363: Community Forums
364: Community Forums
365: Community Forums
366: Community Forums
367: Community Forums
368: Community Forums
369: Community Forums
370: Home
371: Community Forums
372: Community Forums
373: Community Forums
374: Downloads
375: Community Forums
376: Community Forums
377: Community Forums

Staff Online:

No staff members are online!
This looks like a bad one! :: Archived
Resolve issues with your computer problems here or read about the latest computer parts and information.
Post new topic    Revive this topic    Printer Friendly Page     Forum Index ›  Hardware

Topic Archived View previous topic :: View next topic  
Author Message
JG300-Ascout
Power User

Offline Offline
Joined: Jan 05, 2005
Posts: 6257
Location: Cyberspace
PostPosted: Sun Jan 01, 2006 5:53 pm
Post subject: This looks like a bad one!

www.foxnews.com/story/...44,00.html

Advice on impementing the fix from y'all?
__________________________________________________________
'Extremely Critical Flaw' in Windows Discovered, Already Exploited
Friday, December 30, 2005
By Lisa Vaas




Microsoft Corp. has issued a security advisory for what Secunia is deeming an "extremely critical flaw" in Windows Metafile Format (.wmf) that is now being exploited on fully patched systems by malicious attackers.
Websense Security Labs is tracking thousands of sites distributing the exploit code from a site called iFrameCASH BUSINESS.
That site and numerous others are distributing spyware and other unwanted software, replacing users' desktop backgrounds with a message that warns of spyware infection and which prompts the user to enter credit card information to pay for a "spyware cleaning" application to remove the detected spyware.
Vulnerable operating systems include a slew of Windows Server 2003 editions: Datacenter Edition, Enterprise Edition, Standard Edition and Web Edition.
Also at risk are Windows XP Home Edition and Windows XP Professional, making both home users and businesses open to attack.
In this fluid attack, researchers have kept up a steady stream of new details about the extent of the exploit's reach, with Google Desktop being the latest reported vector.
F-Secure reported on Wednesday that Google Desktop tries to index image files with the exploit, executing it in the process. F-Secure reports that this exploitation-via-indexing may wind up occurring with other desktop search engines as well.
(Story continues below)


Google had no immediate comment. To avoid the problem, security experts suggest disabling the feature's indexing of media files, or to remove Google Desktop altogether.
A workaround called REGSVR32 has been posted and was included in Microsoft's advisory. However, it should be noted that as of Thursday evening, some security researchers were reporting that the workaround is not fully successful.
The workaround is as follows, as quoted from the advisory:
Un-register the Windows Picture and Fax Viewer (Shimgvw.dll)
1. Click Start, click Run, type "regsvr32 -u %windir%system32shimgvw.dll" (without the quotation marks), and then click OK.
2. A dialog box appears to confirm that the un-registration process has succeeded.
� Click OK to close the dialog box.
Impact of Workaround: The Windows Picture and Fax Viewer will no longer be started when users click on a link to an image type that is associated with the Windows Picture and Fax Viewer.
To undo this change, re-register Shimgvw.dll by following the above steps. Replace the text in Step 1 with "regsvr32 %windir%system32shimgvw.dll" (without the quotation marks).
F-Secure notes that this workaround beats filtering .wmf files, given that files with other image extensions � such as BMP, GIF, JPG, JPEG, TIFF, etc. � can be used to exploit machines.
F-Secure also recommends filtering domains at corporate firewalls. These sites should be listed as off-limits:
toolbarbiz.business
toolbarsite.biz
toolbartraff.biz
toolbarurl.biz
buytoolbar.biz
buytraff.biz
iframebiz.biz
iframecash.biz
iframesite.biz
iframetraff.biz
iframeurl.business
F-Secure notes that it's seen 57 versions of this malicious .wmf file exploit as of Thursday, detected as PFV-Exploit.
The security firm is predicting that, even though the exploit has only been used to install spyware or fake antispyware/antivirus software thus far, it anticipates that real viruses will start to spread soon.
According to the Sunbelt Software blog, "any application that automatically displays a WMF image" can be a vector for infection, including older versions of Firefox, current versions of Opera, Outlook and all current versions of Internet Explorer on all Windows versions.
"This is a zero-day exploit, the kind that give security researchers cold chills," according to Sunbelt's blog. "You can get infected by simply viewing an infected WMF image."
According to F-Secure, Trojan downloaders are taking advantage of the vulnerability to install Trojan-Downloader.Win32.Agent.abs, Trojan-Dropper.Win32.Small.zp, Trojan.Win32.Small.ga and Trojan.Win32.Small.ev.
F-Secure also reports that some of the Trojans install hoax anti-malware programs such as Avgold.
F-Secure traced the exploit to Russian sites, one of which is allegedly registered to former Soviet Union President Mikhail Gorbachev.
Sunbelt warns that users are likely to get infected by being directed to one of the sites via spam that offer dirty pictures, free software or other bait.
The attack works by tricking users into opening malicious ".wmf" files in "Windows Picture and Fax Viewer" or by previewing such a file by selecting it in Windows Explorer. The attack can also be triggered automatically when visiting malicious Web sites via Internet Explorer.
Although Secunia deemed the flaw highly critical, at least one security researcher was dismissive of the bug's severity.
Pete Lindstrom, research director for Spire Security LLC, said that at this stage in the game, anything that requires user interaction is hardly worth notice.
"There's no such thing as 'extremely critical' when user interaction is required," Lindstrom said. "That's just silly."
But as far as using IE goes, download of malicious software is automatic, happening immediately upon going to the site, pointed out Alex Eckelberry, president of Sunbelt Software.
"There is no user interaction required," he wrote in an e-mail exchange. "You hit the Web site, you get hit immediately. No prompts, nothing."
John Pescatore, an analyst with Gartner Inc., said that this type of attack may be slowed down by requiring users to click on a malicious .wmf file or to go to a malicious Web site, but that doesn't mean it won't spread fast, given users' willingness to click on bait.
"One of these [attacks] where clicking on a URL [is involved], those can spread pretty fast," he said, given users' proclivity to click away.
"We do online consumer studies. Two years ago, 30 percent had fallen for phishing [schemes]. They entered their user name, password or credit card information. This year, many fewer completely fell for them, but they still clicked on the link in the phishing e-mail."
Given the rise of keystroke loggers that can automatically be downloaded onto a user's system after the user visits a malicious site, that means the Web-surfing population is still ripe for phishing, Pescatore said.
"They're still clicking on links, and whenever malicious software gets installed, that's when you get a critical rating, because all sorts of bad things can happen."
According to Secunia, the vulnerability is caused by an error in handling corrupted .wmf files � a graphics file format used to exchange graphics information between Microsoft Windows applications that can hold vector and bit-mapped images.
Secunia confirmed the vulnerability on a fully patched system running Windows XP SP2. The advisory said that Windows Server 2003 SP0 and SP1 systems have also reportedly been affected.
A Microsoft spokesman told eWEEK in an e-mail exchange on Wednesday that Microsoft "is investigating new public reports of a possible vulnerability in Windows," although he didn't give an ETA for a patch.
"Microsoft will continue to investigate the public reports to help provide additional guidance for customers," he said. "Upon completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a fix through our monthly release process or issuing a security advisory, depending on customer needs."
The spokesman went on to encourage customers to follow Microsoft's Protect Your PC guidelines of enabling a firewall, getting software updates and installing anti-virus software.
Customers who think they've been affected can also contact Product Support Services, which is at 1-866-PCSAFETY in North America or at support.microsoft.com/security for outside North America.
Microsoft also advises customers who think they've been attacked to contact their local FBI office or to post the incident on www.ifccfbi.gov. Customers outside the United States should contact the national law enforcement agency in their country, the spokesman said.
The advisory issued by Microsoft later on Wednesday said that Microsoft is aware of the code, which allows an attacker "to execute arbitrary code in the security context of the logged-on user, when such user is visiting a Web site that contains a specially crafted Windows Metafile (WMF) image."
Microsoft's advisory echoed Lindstrom's take, however, stating that attackers have "no way to force users to visit a malicious Web site."
Instead, the advisory continued, attackers have to persuade users to visit the sites, "typically by getting them to click a link that takes them to the attacker's Web site."
The advisory said that Microsoft would either be issuing a patch through its monthly release process or would provide an out-of-cycle security update, "depending on customer needs."
Microsoft's spokesman declined to state how many customers had reported that they had been victimized by the attack.
Secunia advised that users avoid opening or previewing untrusted .wmf files, as well as set security level to "High" in IE.
Lindstrom noted that the long-term answer to dealing with what he called this type of "flotsam and jetsam" of constant security alerts is to install host intrusion prevention software to designate what software is allowed to run on a system and what it's allowed to do.
As far as the short-term response to this particular vulnerability goes, Lindstrom echoed Secunia's advisory when it comes to untrusted files: "Don't click on it," he said.
Editor's Note: This story was updated to include Microsoft's statement, more on the recommended workaround and more details about the exploit from Sunbelt and F-Secure.

_________________
"All facts go to clearly prove that Shades is a thrice-cursed traitor & mentally deranged person steeped in inveterate enmity toward mankind"
Back to top
View user's profile Photo Gallery
Shadow_Bshwackr
Janitor

Offline Offline
Joined: Jan 21, 2005
Posts: 7019
Location: Central Illinois, USA
PostPosted: Wed Jan 04, 2006 11:51 am
Post subject: Re: This looks like a bad one!

Thanks for the heads up on this one Ascout! I don't know about anyone else, but I like and use WMP quite often... Wink
Back to top
View user's profile Visit poster's website Photo Gallery
Display posts from previous:   
Post new topic    Revive this topic    Printer Friendly Page    Forum Index ›  Hardware
Page 1 of 1
All times are GMT - 6 Hours

Archive Revive
Username:
This is an archived topic - your reply will not be appended here.
Instead, a new topic will be generated in the active forum.
The new topic will provide a reference link to this archived topic.