Urban75 Home About Offline BrixtonBuzz Contact

Windows Metafile Vulnerability

Velouria

Long time lurker
Note: if you run Windows, this WAS important but panic well over by now as Microsoft have released an official patch so if you've been updating regularly you'll be OK by now.Systems running Windows 2000, Windows XP, Windows Server 2003, and quite probably older versions too are vulnerable.Posting this here as I don't see another thread about it other than a vaguely worded one which mentions it

I see some sysadmins will be having fun tomorrow (I should be on holiday but well, with this going on, might get called in ... :(). Apparently, a longstanding vulnerability in the way that Windows handles Windows Metafiles (WMF files) has been exploited in a way which is hard for antivirus programmes to pick up on. Even just blocking files at your firewall, etc., is not enough to mitigate the vulnerability - due to the way WMF files are handled, it will still execute even if the file is renamed to .JPG or whatever. The vulnerability lies in the way that WMF files are structured. A user may specify an EXITPROC or exit procedure inside the WMF which is called when the WMF fails to draw properly. Unfortunately, there are no limits as to what you can call ... leaving a huge gaping security hole. And there is no Microsoft patch at present, however there is a third party written patch (and Microsoft's workaround which, umm ... doesn't really work :p)

You can read more about it here at the Internet Storm Center (where they also have the patch). Keep going through using the Next link ... you'll find the patch. A worm which exploits it is already in the wild.

The ISC are advising people to use the unofficial patch in the interim until Microsoft release an official one. The unofficial patch doesn't alter any Windows system files, but instead patches Windows 'on the fly' to disable the vulnerability. It's your choice really - install the unofficial patch, follow Microsoft's advice which may not do you much good as the steps you take may be reversed when you install/use programs which 'fix' the fact you unregistered the DLL ...

It's up to you I guess - trust the security experts or trust Microsoft? You choose.

Users running non-Microsoft operating systems: please go to another thread to slag off Microsoft and their lamentable security woes :)

Sysadmins: I wanna know what you've done/are doing/will be doing (Some of you may well be working now, called in because of this or on shift ...)
 
Yikes :eek:

thanks Velouria for so elegantly explaining it.

I've gone back and edited my mistake in another thread.

I can see I'll have my work cut out when I go back to work applying this patch to the off-domain student machines I rather amateurishly look after.
 
gentlegreen said:
is there any hope for my horrible windows 98 lab?

Not sure. Does 98 even have the Image/Fax viewer?

That's the main app that's vulnerable - though the vulnerability is actually in a DLL called by that and possibly by other apps.

See the link for the name of that DLL, then see whether it's present on those machines.

Look at the file type handling on those machines to see what opens .WMF and what opens the relevant MIME type.

I'm not entirely sure whether my NT4 is vulnerable - but I redirected .WMF to open in something else just in case.
 
I thought that was quite amusing, but it's probably just that they cut and pasted the code wholesale from older versions of Windows.

Honestly, I think Vista is going to be a massive anticlimax. I've not seen anything that's not been done by other people years ago.
 
Back
Top Bottom