Web Design - Publish.com
Publish.com Ziff-Davis Enterprise  
SEARCH · ONLINE MEDIA · MOBILE · WEB DESIGN · GRAPHICS TOOLS · PRINTING · PHOTO · TIPS · OPINIONS
Home arrow Web Design arrow Microsoft's WMF Patch Leaks Out
Microsoft's WMF Patch Leaks Out
By Ryan Naraine

Rate This Article:
Add This Article To:
A cryptographically signed version of Microsoft's WMF patch inadvertently leaks out to a security community site, prompting an updated advisory from the software giant.

A cryptographically signed version of Microsoft Corp.'s patch for the Windows Metafile vulnerability accidentally leaked onto the Internet late Tuesday, adding a new wrinkle to the company's round-the-clock efforts to stop the flow of malicious exploits.

The MSRC (Microsoft Security Response Center) acknowledged that a slip-up caused "a fast-track, pre-release version of the update" to be posted to a security community site and urged users to "disregard" the premature update.

The company's official recommendation is for Windows users to unregister the Windows Picture and Fax Viewer (Shimgvw.dll) and wait for a properly tested patch scheduled for Jan. 10.

Mike Reavey, operations manager of the MSRC, said the appearance of the pre-release code was inadvertent.

"There has been some discussion and pointers on subsequent sites to the pre-release code. We recommend that customers disregard the postings and continue to keep up to date with our latest information on the WMF issue," Reavey said.

A security researcher who had seen the leaked patch told eWEEK it contained an updated GDI32.DLL file that was created by Microsoft immediately after the first exploits started appearing on malicious Web sites on Dec. 27.

Interestingly, Microsoft's patch works seamlessly with the unofficial hotfix from reverse-engineering guru Ilfak Guilfanov. "It looks like Microsoft was right on the ball with a patch and they've done it the right way, taking all things into consideration, including the fact that [Guilfanov's patch] is going to be on a lot of machines," a source said.

Microsoft has frowned on the available of a third-party update, insisting that it cannot vouch for the quality of an unofficial patch that did not go through a full test pass.

Read more here about the third-party WMF patch and why Microsoft recommends caution.

Even as Microsoft scrambles to contain a threat that has grown to more than 100 exploits, there is a growing sense that some in the research community—and the mainstream media—have overblown the severity of the issue.

Privately, Redmond officials have bristled at attempts to liken the WMF exploits to debilitating network worms like Blaster and Sasser, especially since significant user interaction is required before an attack is successful.

Shane Coursen, senior technical consultant at Kaspersky Lab, said the general feeling was that the vulnerability should be rated "a step below critical."

"If this vulnerability were to be packaged in a completely automated worm in the wild that doesn't require the user to click on anything, then it would be really critical. But there's no automated attack vector here," Coursen said.

However, Coursen said the flaw represents a "very serious" threat that should be fixed as soon as a thoroughly tested patch is available. "It's very important the people follow the advice to unregister Shimgvw.dll and keep anti-virus programs updated. You don't want to overblow the threat but you don't want to give people a false sense of security either."

For advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internet's Security IT Hub.

Marc Maiffret, co-founder and chief hacking officer of eEye Digital Security, said a discussion about the severity of the threat is meaningless.

"There's this mentality among IT people and even at Microsoft that it's not a big threat unless thousands and thousands of users are being compromised. That's not the way to look at it. There's a reason phishing is a huge problem. It's a huge problem because people can be easily tricked into clicking on a bad link. That's why this is a big deal, even if the majority of users aren't being compromised," Maiffret said.

He also warned against believing that the current attacks cannot be automated. "This can be totally automated … because it required a click today [doesn't mean] it will require a click tomorrow. There are plenty of other things you can do to launch an attack from a clean site," Maiffret said.

He referred to a November 2004 incident when hackers broke into a load balancing server that handles ad deliveries for Germany's Falk eSolutions AG and successfully loaded exploit code on banner advertising served on hundreds of Web sites.

"If an attacker breaks into an ISP that hosts images for thousands of good sites, all he has to do is replace those with malicious WMF files. He can break into any high-traffic site and put his image there. That won't require a phishing click," Maiffret said. "You can't rank threats based on how many people are being compromised."

Maiffret, who was crediting with finding and reporting a high-risk WMF bug to Microsoft last year, said IT administrators should avoid rating flaws based on which threats make news headlines.

"If it's not in the news, that's the one you want to be afraid of. There are hundreds of zero-day, targeted attacks happening right now. The ones in the news are the ones we know about. But you can't base security off the worm you read about in the papers. That was how it was in the 1990s. Today, the climate is that you are being attacked by the flaw you don't know about and if it's not found in the wild, you'll never know about it," Maiffret said.

Check out eWEEK.com's for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzer's Weblog.


Discuss Microsoft's WMF Patch Leaks Out
 
>>> Be the FIRST to comment on this article!
 

 
 
>>> More Web Design Articles          >>> More By Ryan Naraine
 


Buyer's Guide
Explore hundreds of products in our Publish.com Buyer's Guide.
Web design
Content management
Graphics Software
Streaming Media
Video
Digital photography
Stock photography
Web development
View all >

ADVERTISEMENT


FREE ZIFF DAVIS ENTERPRISE ESEMINARS AT ESEMINARSLIVE.COM
  • Dec 10, 4 p.m. ET
    Eliminate the Drawbacks of Traditional Backup/Replication for Linux
    with Michael Krieger. Sponsored by InMage
  • Dec 11, 1 p.m. ET
    Data Modeling and Metadata Management with PowerDesigner
    with Joel Shore. Sponsored by Sybase
  • Dec 12, 12 p.m. ET
    Closing the IT Business Gap: Monitoring the End-User Experience
    with Michael Krieger. Sponsored by Compuware
  • Dec 12, 2 p.m. ET
    Enabling IT Consolidation
    with Michael Krieger. Sponsored by Riverbed & VMWare
  • VTS
    Join us on Dec. 19 for Discovering Value in Stored Data & Reducing Business Risk. Join this interactive day-long event to learn how your enterprise can cost-effectively manage stored data while keeping it secure, compliant and accessible. Disorganized storage can prevent your enterprise from extracting the maximum value from information assets. Learn how to organize enterprise data so vital information assets can help your business thrive. Explore policies, strategies and tactics from creation through deletion. Attend live or on-demand with complimentary registration!
    FEATURED CONTENT
    IT LINK DISCUSSION - MIGRATION
    A Windows Vista® migration introduces new and unique challenges to any IT organization. It's important to understand early on whether your systems, hardware, applications and end users are ready for the transition.
    Join the discussion today!



    .NAME Charging For Whois
    Whois has always been a free service, but the .NAME registry is trying to change that.
    Read More >>

    Sponsored by Ziff Davis Enterprise Group

    NEW FROM ZIFF DAVIS ENTERPRISE


    Delivering the latest technology news & reviews straight to your handheld device

    Now you can get the latest technology news & reviews from the trusted editors of eWEEK.com on your handheld device
    mobile.eWEEK.com

     


    RSS 2.0 Feed


    internet
    rss graphic Publish.com
    rss graphic Google Watch

    Video Interviews


    streaming video
    Designing Apps for Usability
    DevSource interviews usability pundit Dr. Jakob Nielsen on everything from the proper attitude for programmers to the importance of prototyping in design to the reasons why PDF, Flash and local search engines can hurt more than they help.
    ADVERTISEMENT