±Recent Visitors

Recent Visitors to Com-Central!

±User Info-big


Welcome Anonymous

Nickname
Password

Membership:
Latest: cgsimpson
New Today: 0
New Yesterday: 0
Overall: 6645

People Online:
Members: 0
Visitors: 693
Total: 693
Who Is Where:
 Visitors:
01: Home
02: Community Forums
03: Community Forums
04: Community Forums
05: Community Forums
06: Home
07: Community Forums
08: News
09: Your Account
10: Community Forums
11: Downloads
12: Photo Gallery
13: Community Forums
14: Community Forums
15: Community Forums
16: Community Forums
17: Community Forums
18: Photo Gallery
19: Community Forums
20: Photo Gallery
21: Your Account
22: Community Forums
23: Community Forums
24: Community Forums
25: Home
26: CPGlang
27: Home
28: Community Forums
29: Home
30: Photo Gallery
31: Home
32: Community Forums
33: Statistics
34: Home
35: Community Forums
36: Community Forums
37: Community Forums
38: Community Forums
39: Community Forums
40: News
41: Community Forums
42: Community Forums
43: Community Forums
44: Photo Gallery
45: Downloads
46: Community Forums
47: Downloads
48: Community Forums
49: Home
50: Community Forums
51: Community Forums
52: Community Forums
53: Photo Gallery
54: Community Forums
55: Community Forums
56: Community Forums
57: Photo Gallery
58: Community Forums
59: Community Forums
60: Photo Gallery
61: Community Forums
62: Community Forums
63: Community Forums
64: Downloads
65: Home
66: Community Forums
67: Community Forums
68: Community Forums
69: Photo Gallery
70: Photo Gallery
71: Community Forums
72: Home
73: Your Account
74: Downloads
75: Home
76: Photo Gallery
77: Community Forums
78: Photo Gallery
79: Home
80: Community Forums
81: Community Forums
82: Photo Gallery
83: Photo Gallery
84: Community Forums
85: Photo Gallery
86: Home
87: Community Forums
88: Community Forums
89: Community Forums
90: Community Forums
91: Community Forums
92: Downloads
93: Photo Gallery
94: Community Forums
95: Community Forums
96: Home
97: Photo Gallery
98: Community Forums
99: Community Forums
100: Community Forums
101: Community Forums
102: Photo Gallery
103: Community Forums
104: Community Forums
105: Photo Gallery
106: Your Account
107: Community Forums
108: Home
109: Photo Gallery
110: Community Forums
111: Photo Gallery
112: Community Forums
113: Photo Gallery
114: Community Forums
115: Home
116: Community Forums
117: Downloads
118: Community Forums
119: Member Screenshots
120: Community Forums
121: Photo Gallery
122: Statistics
123: Community Forums
124: Home
125: Community Forums
126: Community Forums
127: Community Forums
128: Your Account
129: Community Forums
130: Downloads
131: Community Forums
132: Home
133: Home
134: Community Forums
135: Downloads
136: Downloads
137: Community Forums
138: Community Forums
139: Community Forums
140: Home
141: Community Forums
142: Community Forums
143: Community Forums
144: Statistics
145: Home
146: Your Account
147: Photo Gallery
148: Community Forums
149: Community Forums
150: Downloads
151: Community Forums
152: Home
153: Photo Gallery
154: Home
155: Home
156: Home
157: Photo Gallery
158: Community Forums
159: Community Forums
160: Downloads
161: Home
162: Community Forums
163: Community Forums
164: Photo Gallery
165: Community Forums
166: Community Forums
167: Community Forums
168: Community Forums
169: Home
170: Community Forums
171: Community Forums
172: Community Forums
173: Home
174: Home
175: Community Forums
176: Community Forums
177: Community Forums
178: Community Forums
179: Community Forums
180: Home
181: Photo Gallery
182: Community Forums
183: Downloads
184: Home
185: Community Forums
186: Community Forums
187: Statistics
188: Community Forums
189: Home
190: Downloads
191: Downloads
192: Community Forums
193: CPGlang
194: Home
195: Community Forums
196: Photo Gallery
197: Your Account
198: Community Forums
199: Community Forums
200: Community Forums
201: Home
202: Downloads
203: Community Forums
204: Community Forums
205: Home
206: Community Forums
207: Downloads
208: Photo Gallery
209: Community Forums
210: Community Forums
211: Community Forums
212: Community Forums
213: Community Forums
214: Photo Gallery
215: Home
216: Photo Gallery
217: Home
218: Home
219: Community Forums
220: Member Screenshots
221: Community Forums
222: Community Forums
223: Community Forums
224: Downloads
225: Downloads
226: Photo Gallery
227: Member Screenshots
228: Downloads
229: Community Forums
230: Community Forums
231: Community Forums
232: Community Forums
233: Downloads
234: Your Account
235: Community Forums
236: Statistics
237: Photo Gallery
238: Community Forums
239: Community Forums
240: Photo Gallery
241: Home
242: Home
243: Community Forums
244: Home
245: Community Forums
246: Community Forums
247: Community Forums
248: Community Forums
249: Home
250: Community Forums
251: Home
252: Member Screenshots
253: Home
254: Community Forums
255: Community Forums
256: Community Forums
257: Community Forums
258: Community Forums
259: Home
260: Photo Gallery
261: Community Forums
262: Community Forums
263: Community Forums
264: Community Forums
265: Community Forums
266: Photo Gallery
267: Community Forums
268: Community Forums
269: Community Forums
270: Photo Gallery
271: Home
272: Photo Gallery
273: Community Forums
274: Photo Gallery
275: Community Forums
276: Home
277: Community Forums
278: Community Forums
279: Home
280: Community Forums
281: Home
282: Photo Gallery
283: Community Forums
284: Community Forums
285: Community Forums
286: Photo Gallery
287: CPGlang
288: Community Forums
289: Home
290: Community Forums
291: Community Forums
292: CPGlang
293: Community Forums
294: Your Account
295: Community Forums
296: Community Forums
297: Community Forums
298: Your Account
299: Community Forums
300: Community Forums
301: Photo Gallery
302: Community Forums
303: Community Forums
304: Community Forums
305: Community Forums
306: Home
307: Community Forums
308: Community Forums
309: CPGlang
310: Community Forums
311: Community Forums
312: CPGlang
313: Community Forums
314: Photo Gallery
315: Home
316: Community Forums
317: Community Forums
318: Photo Gallery
319: Member Screenshots
320: Community Forums
321: Community Forums
322: Home
323: Home
324: Statistics
325: Photo Gallery
326: CPGlang
327: Community Forums
328: Community Forums
329: Community Forums
330: Community Forums
331: Downloads
332: Downloads
333: Community Forums
334: Community Forums
335: Community Forums
336: Community Forums
337: Community Forums
338: Community Forums
339: Community Forums
340: Downloads
341: Community Forums
342: Photo Gallery
343: Community Forums
344: Community Forums
345: Community Forums
346: Home
347: Community Forums
348: Home
349: Statistics
350: Downloads
351: Community Forums
352: Home
353: Community Forums
354: Community Forums
355: Home
356: Community Forums
357: Photo Gallery
358: Community Forums
359: Member Screenshots
360: Community Forums
361: Photo Gallery
362: Community Forums
363: Home
364: Home
365: Community Forums
366: Member Screenshots
367: Community Forums
368: Community Forums
369: Community Forums
370: Community Forums
371: Community Forums
372: Community Forums
373: Your Account
374: Statistics
375: Community Forums
376: Your Account
377: Community Forums
378: Community Forums
379: Community Forums
380: Community Forums
381: Photo Gallery
382: Community Forums
383: Community Forums
384: Member Screenshots
385: Community Forums
386: Community Forums
387: Photo Gallery
388: Community Forums
389: Your Account
390: Home
391: Community Forums
392: Home
393: Community Forums
394: Member Screenshots
395: Photo Gallery
396: Photo Gallery
397: Community Forums
398: Downloads
399: Photo Gallery
400: Community Forums
401: Photo Gallery
402: Home
403: Community Forums
404: Community Forums
405: Community Forums
406: Community Forums
407: Community Forums
408: Home
409: Photo Gallery
410: Downloads
411: Photo Gallery
412: Community Forums
413: Downloads
414: Member Screenshots
415: Downloads
416: Photo Gallery
417: Community Forums
418: Community Forums
419: Community Forums
420: Home
421: Community Forums
422: Photo Gallery
423: Community Forums
424: Community Forums
425: Photo Gallery
426: Community Forums
427: Photo Gallery
428: Home
429: Home
430: Home
431: Photo Gallery
432: Photo Gallery
433: Community Forums
434: Photo Gallery
435: Home
436: Photo Gallery
437: Community Forums
438: CPGlang
439: Downloads
440: Home
441: Community Forums
442: News Archive
443: Community Forums
444: Photo Gallery
445: Community Forums
446: Community Forums
447: Photo Gallery
448: Community Forums
449: Home
450: Community Forums
451: Photo Gallery
452: Photo Gallery
453: Community Forums
454: Photo Gallery
455: Photo Gallery
456: Community Forums
457: Community Forums
458: Photo Gallery
459: Your Account
460: Community Forums
461: Community Forums
462: Statistics
463: Photo Gallery
464: Community Forums
465: Community Forums
466: Community Forums
467: Community Forums
468: Photo Gallery
469: Home
470: Community Forums
471: Community Forums
472: Community Forums
473: Community Forums
474: Home
475: Community Forums
476: Photo Gallery
477: Photo Gallery
478: Community Forums
479: Home
480: Community Forums
481: Photo Gallery
482: News Archive
483: Community Forums
484: Photo Gallery
485: Home
486: Community Forums
487: Community Forums
488: Your Account
489: Community Forums
490: Community Forums
491: Community Forums
492: Community Forums
493: Home
494: Home
495: Photo Gallery
496: Home
497: Photo Gallery
498: Photo Gallery
499: Community Forums
500: Community Forums
501: Home
502: Downloads
503: Community Forums
504: Home
505: Community Forums
506: Community Forums
507: Photo Gallery
508: Community Forums
509: Home
510: Home
511: Community Forums
512: Community Forums
513: Community Forums
514: Home
515: Community Forums
516: Community Forums
517: Photo Gallery
518: Photo Gallery
519: Community Forums
520: Community Forums
521: Community Forums
522: News
523: Community Forums
524: Community Forums
525: Photo Gallery
526: Community Forums
527: Downloads
528: Community Forums
529: Home
530: Member Screenshots
531: Community Forums
532: Community Forums
533: Home
534: Community Forums
535: Community Forums
536: Photo Gallery
537: Community Forums
538: Community Forums
539: Community Forums
540: Community Forums
541: Community Forums
542: Photo Gallery
543: Community Forums
544: Photo Gallery
545: Downloads
546: CPGlang
547: Home
548: Community Forums
549: Community Forums
550: Photo Gallery
551: Home
552: News Archive
553: Home
554: Home
555: Member Screenshots
556: Photo Gallery
557: Community Forums
558: Photo Gallery
559: Photo Gallery
560: Downloads
561: Home
562: Your Account
563: Community Forums
564: Community Forums
565: Community Forums
566: Home
567: Community Forums
568: Community Forums
569: Community Forums
570: Community Forums
571: Home
572: Your Account
573: Community Forums
574: Home
575: Community Forums
576: Community Forums
577: Home
578: Photo Gallery
579: Community Forums
580: Community Forums
581: Community Forums
582: Community Forums
583: Photo Gallery
584: Community Forums
585: Your Account
586: Community Forums
587: Downloads
588: Community Forums
589: Home
590: Community Forums
591: Home
592: Community Forums
593: Community Forums
594: Community Forums
595: Community Forums
596: Downloads
597: Community Forums
598: Community Forums
599: Community Forums
600: Community Forums
601: Community Forums
602: Home
603: Home
604: Community Forums
605: Community Forums
606: Community Forums
607: Community Forums
608: Community Forums
609: Home
610: Downloads
611: Photo Gallery
612: Home
613: Community Forums
614: Photo Gallery
615: Community Forums
616: Community Forums
617: Photo Gallery
618: Home
619: Community Forums
620: Community Forums
621: Community Forums
622: Community Forums
623: Community Forums
624: Home
625: Home
626: Community Forums
627: Community Forums
628: Community Forums
629: Downloads
630: Home
631: Home
632: Photo Gallery
633: Photo Gallery
634: Community Forums
635: Home
636: Home
637: Community Forums
638: Community Forums
639: Community Forums
640: Community Forums
641: Your Account
642: Community Forums
643: Community Forums
644: Community Forums
645: Home
646: Community Forums
647: Photo Gallery
648: Community Forums
649: Home
650: Community Forums
651: Photo Gallery
652: Home
653: Photo Gallery
654: Community Forums
655: Community Forums
656: Community Forums
657: Community Forums
658: Home
659: Community Forums
660: Photo Gallery
661: Community Forums
662: Community Forums
663: Community Forums
664: Home
665: Photo Gallery
666: Community Forums
667: Community Forums
668: Community Forums
669: Member Screenshots
670: Community Forums
671: Community Forums
672: News
673: Community Forums
674: Photo Gallery
675: Community Forums
676: Photo Gallery
677: Photo Gallery
678: Community Forums
679: Home
680: Community Forums
681: Statistics
682: Community Forums
683: Community Forums
684: Community Forums
685: Home
686: Community Forums
687: Downloads
688: Home
689: Community Forums
690: Community Forums
691: Community Forums
692: Community Forums
693: Photo Gallery

Staff Online:

No staff members are online!
This looks like a bad one! :: Archived
Resolve issues with your computer problems here or read about the latest computer parts and information.
Post new topic    Revive this topic    Printer Friendly Page     Forum Index ›  Hardware

Topic Archived View previous topic :: View next topic  
Author Message
JG300-Ascout
Power User

Offline Offline
Joined: Jan 05, 2005
Posts: 6257
Location: Cyberspace
PostPosted: Sun Jan 01, 2006 5:53 pm
Post subject: This looks like a bad one!

www.foxnews.com/story/...44,00.html

Advice on impementing the fix from y'all?
__________________________________________________________
'Extremely Critical Flaw' in Windows Discovered, Already Exploited
Friday, December 30, 2005
By Lisa Vaas




Microsoft Corp. has issued a security advisory for what Secunia is deeming an "extremely critical flaw" in Windows Metafile Format (.wmf) that is now being exploited on fully patched systems by malicious attackers.
Websense Security Labs is tracking thousands of sites distributing the exploit code from a site called iFrameCASH BUSINESS.
That site and numerous others are distributing spyware and other unwanted software, replacing users' desktop backgrounds with a message that warns of spyware infection and which prompts the user to enter credit card information to pay for a "spyware cleaning" application to remove the detected spyware.
Vulnerable operating systems include a slew of Windows Server 2003 editions: Datacenter Edition, Enterprise Edition, Standard Edition and Web Edition.
Also at risk are Windows XP Home Edition and Windows XP Professional, making both home users and businesses open to attack.
In this fluid attack, researchers have kept up a steady stream of new details about the extent of the exploit's reach, with Google Desktop being the latest reported vector.
F-Secure reported on Wednesday that Google Desktop tries to index image files with the exploit, executing it in the process. F-Secure reports that this exploitation-via-indexing may wind up occurring with other desktop search engines as well.
(Story continues below)


Google had no immediate comment. To avoid the problem, security experts suggest disabling the feature's indexing of media files, or to remove Google Desktop altogether.
A workaround called REGSVR32 has been posted and was included in Microsoft's advisory. However, it should be noted that as of Thursday evening, some security researchers were reporting that the workaround is not fully successful.
The workaround is as follows, as quoted from the advisory:
Un-register the Windows Picture and Fax Viewer (Shimgvw.dll)
1. Click Start, click Run, type "regsvr32 -u %windir%system32shimgvw.dll" (without the quotation marks), and then click OK.
2. A dialog box appears to confirm that the un-registration process has succeeded.
� Click OK to close the dialog box.
Impact of Workaround: The Windows Picture and Fax Viewer will no longer be started when users click on a link to an image type that is associated with the Windows Picture and Fax Viewer.
To undo this change, re-register Shimgvw.dll by following the above steps. Replace the text in Step 1 with "regsvr32 %windir%system32shimgvw.dll" (without the quotation marks).
F-Secure notes that this workaround beats filtering .wmf files, given that files with other image extensions � such as BMP, GIF, JPG, JPEG, TIFF, etc. � can be used to exploit machines.
F-Secure also recommends filtering domains at corporate firewalls. These sites should be listed as off-limits:
toolbarbiz.business
toolbarsite.biz
toolbartraff.biz
toolbarurl.biz
buytoolbar.biz
buytraff.biz
iframebiz.biz
iframecash.biz
iframesite.biz
iframetraff.biz
iframeurl.business
F-Secure notes that it's seen 57 versions of this malicious .wmf file exploit as of Thursday, detected as PFV-Exploit.
The security firm is predicting that, even though the exploit has only been used to install spyware or fake antispyware/antivirus software thus far, it anticipates that real viruses will start to spread soon.
According to the Sunbelt Software blog, "any application that automatically displays a WMF image" can be a vector for infection, including older versions of Firefox, current versions of Opera, Outlook and all current versions of Internet Explorer on all Windows versions.
"This is a zero-day exploit, the kind that give security researchers cold chills," according to Sunbelt's blog. "You can get infected by simply viewing an infected WMF image."
According to F-Secure, Trojan downloaders are taking advantage of the vulnerability to install Trojan-Downloader.Win32.Agent.abs, Trojan-Dropper.Win32.Small.zp, Trojan.Win32.Small.ga and Trojan.Win32.Small.ev.
F-Secure also reports that some of the Trojans install hoax anti-malware programs such as Avgold.
F-Secure traced the exploit to Russian sites, one of which is allegedly registered to former Soviet Union President Mikhail Gorbachev.
Sunbelt warns that users are likely to get infected by being directed to one of the sites via spam that offer dirty pictures, free software or other bait.
The attack works by tricking users into opening malicious ".wmf" files in "Windows Picture and Fax Viewer" or by previewing such a file by selecting it in Windows Explorer. The attack can also be triggered automatically when visiting malicious Web sites via Internet Explorer.
Although Secunia deemed the flaw highly critical, at least one security researcher was dismissive of the bug's severity.
Pete Lindstrom, research director for Spire Security LLC, said that at this stage in the game, anything that requires user interaction is hardly worth notice.
"There's no such thing as 'extremely critical' when user interaction is required," Lindstrom said. "That's just silly."
But as far as using IE goes, download of malicious software is automatic, happening immediately upon going to the site, pointed out Alex Eckelberry, president of Sunbelt Software.
"There is no user interaction required," he wrote in an e-mail exchange. "You hit the Web site, you get hit immediately. No prompts, nothing."
John Pescatore, an analyst with Gartner Inc., said that this type of attack may be slowed down by requiring users to click on a malicious .wmf file or to go to a malicious Web site, but that doesn't mean it won't spread fast, given users' willingness to click on bait.
"One of these [attacks] where clicking on a URL [is involved], those can spread pretty fast," he said, given users' proclivity to click away.
"We do online consumer studies. Two years ago, 30 percent had fallen for phishing [schemes]. They entered their user name, password or credit card information. This year, many fewer completely fell for them, but they still clicked on the link in the phishing e-mail."
Given the rise of keystroke loggers that can automatically be downloaded onto a user's system after the user visits a malicious site, that means the Web-surfing population is still ripe for phishing, Pescatore said.
"They're still clicking on links, and whenever malicious software gets installed, that's when you get a critical rating, because all sorts of bad things can happen."
According to Secunia, the vulnerability is caused by an error in handling corrupted .wmf files � a graphics file format used to exchange graphics information between Microsoft Windows applications that can hold vector and bit-mapped images.
Secunia confirmed the vulnerability on a fully patched system running Windows XP SP2. The advisory said that Windows Server 2003 SP0 and SP1 systems have also reportedly been affected.
A Microsoft spokesman told eWEEK in an e-mail exchange on Wednesday that Microsoft "is investigating new public reports of a possible vulnerability in Windows," although he didn't give an ETA for a patch.
"Microsoft will continue to investigate the public reports to help provide additional guidance for customers," he said. "Upon completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a fix through our monthly release process or issuing a security advisory, depending on customer needs."
The spokesman went on to encourage customers to follow Microsoft's Protect Your PC guidelines of enabling a firewall, getting software updates and installing anti-virus software.
Customers who think they've been affected can also contact Product Support Services, which is at 1-866-PCSAFETY in North America or at support.microsoft.com/security for outside North America.
Microsoft also advises customers who think they've been attacked to contact their local FBI office or to post the incident on www.ifccfbi.gov. Customers outside the United States should contact the national law enforcement agency in their country, the spokesman said.
The advisory issued by Microsoft later on Wednesday said that Microsoft is aware of the code, which allows an attacker "to execute arbitrary code in the security context of the logged-on user, when such user is visiting a Web site that contains a specially crafted Windows Metafile (WMF) image."
Microsoft's advisory echoed Lindstrom's take, however, stating that attackers have "no way to force users to visit a malicious Web site."
Instead, the advisory continued, attackers have to persuade users to visit the sites, "typically by getting them to click a link that takes them to the attacker's Web site."
The advisory said that Microsoft would either be issuing a patch through its monthly release process or would provide an out-of-cycle security update, "depending on customer needs."
Microsoft's spokesman declined to state how many customers had reported that they had been victimized by the attack.
Secunia advised that users avoid opening or previewing untrusted .wmf files, as well as set security level to "High" in IE.
Lindstrom noted that the long-term answer to dealing with what he called this type of "flotsam and jetsam" of constant security alerts is to install host intrusion prevention software to designate what software is allowed to run on a system and what it's allowed to do.
As far as the short-term response to this particular vulnerability goes, Lindstrom echoed Secunia's advisory when it comes to untrusted files: "Don't click on it," he said.
Editor's Note: This story was updated to include Microsoft's statement, more on the recommended workaround and more details about the exploit from Sunbelt and F-Secure.

_________________
"All facts go to clearly prove that Shades is a thrice-cursed traitor & mentally deranged person steeped in inveterate enmity toward mankind"
Back to top
View user's profile Photo Gallery
Shadow_Bshwackr
Janitor

Offline Offline
Joined: Jan 21, 2005
Posts: 7015
Location: Central Illinois, USA
PostPosted: Wed Jan 04, 2006 11:51 am
Post subject: Re: This looks like a bad one!

Thanks for the heads up on this one Ascout! I don't know about anyone else, but I like and use WMP quite often... Wink
Back to top
View user's profile Visit poster's website Photo Gallery
Display posts from previous:   
Post new topic    Revive this topic    Printer Friendly Page    Forum Index ›  Hardware
Page 1 of 1
All times are GMT - 6 Hours

Archive Revive
Username:
This is an archived topic - your reply will not be appended here.
Instead, a new topic will be generated in the active forum.
The new topic will provide a reference link to this archived topic.