Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

Security Flaw -- fact or fiction?

Dec 30, 2005 11:58AM PST

The article below was just posted in a tube group (I'm a signature maker) that I'm in. I've been traveling for a few days and don't seem to find anything on this other than this being posted in our group. We were asked not to click on any links or to put any links in our emails in this group. Is anyone aware of this and is it fact or fiction?

Thanks -- Julea

Windows Security Flaw Is 'Severe'
By Brian Krebs
Special to The Washington Post
Friday, December 30, 2005

A previously unknown flaw in Microsoft Corp.'s Windows operating system is leaving computer users vulnerable to spyware, viruses and other programs that could overtake their machines and has sent the company scrambling to come up with a fix.

Microsoft said in a statement yesterday that it is investigating the vulnerability and plans to issue a software patch to fix the problem. The company could not say how soon that patch would be available.

A clerk in Seoul with a box of Microsoft Corp.'s Windows software. Microsoft is trying to repair a flaw in the product. (By Seokyong Lee -- Bloomberg News)

Mike Reavey, operations manager for Microsoft's Security Response Center, called the flaw "a very serious issue."

Security researchers revealed the flaw on Tuesday and posted instructions online that showed how would-be attackers could exploit the flaw. Within hours, computer virus and spyware authors were using the flaw to distribute malicious programs that could allow them to take over and remotely control afflicted computers.

Unlike with previously revealed vulnerabilities, computers can be infected simply by visiting one of the Web sites or viewing an infected image in an e-mail through the preview pane in older versions of Microsoft Outlook, even if users did not click on anything or open any files. Operating system versions ranging from the current Windows XP to Windows 98 are affected.

An estimated 90 percent of personal computers run on Microsoft Windows operating systems. Microsoft has found itself under attack on several instances and has been forced to issue a number of patches to keep computers running Windows safe. Mac and Linux computer users are not at risk with this attack, even if their computers run Microsoft programs such as Office or the Internet Explorer Web browser.

Reavey encouraged users to update their anti-virus software, ensure all Windows security patches are installed, avoid visiting unfamiliar Web sites, and refrain from clicking on links that arrive via e-mail or instant message.

"The problem with this attack is that it is so hard to defend against for the average user," said Johannes Ullrich, chief research officer for the SANS Internet Storm Center in Bethesda.

At first, the vulnerability was exploited by just a few dozen Web sites. Programming code embedded in these pages would install a program that warned victims their machines were infested with spyware, then prompted them to pay $40 to remove the supposed pests.

Since then, however, hundreds of sites have begun using the flaw to install a broad range of malicious software. SANS has received several reports of attackers blasting out spam e-mails containing links that lead to malicious sites exploiting the new flaw, Ullrich said.

Dean Turner, a senior manager at anti- virus firm Symantec Corp. of Cupertino, Calif., said the company has seen the vulnerability exploited to install software that intercepts personal and financial information when users of infected computers enter the data at certain banking or e-commerce sites.

Eric Sites, vice president of research and development for anti-spyware firm Sunbelt Software, said he has spotted spyware being downloaded to a user's machine by online banner advertisements.

"Pretty much all of the spyware guys who normally use other techniques for pushing this stuff down to your machine are now picking this exploit up," Sites said.

Because the vulnerability exists within a faulty Windows component, security experts warn that Windows users who eschew Internet Explorer in favor of alternative Web browsers, such as older versions of Firefox and Opera, can still get their PCs infected if they agree to download a file from a site taking advantage of the flaw.

Richard M. Smith, a Boston security and privacy consultant, said he was particularly worried that the vulnerability could soon be used to power a fast- spreading e-mail worm.

"We could see the mother of all worms here," Smith said. "My big fear is we're going to wake up in the next week or two and have people warning users not to read their e-mail because something is going around that's extremely virulent."

Discussion is locked

- Collapse -
Fact
Dec 30, 2005 2:29PM PST

Hi Julea,

I received this today from F-Secure:

[quote]PRESS RELEASE

For release December 30, 2005

Zero-day vulnerability in Windows still unpatched

Hundreds of millions of PCs still at risk; F-Secure able to stop the
malicious files

December 30, 2005

The zero-day vulnerability related to Windows' WMF files first reported on
December 27 is still unpatched by Microsoft. At that time Trojan downloaders
were seen to actively exploit the vulnerability with fully patched Windows XP
SP2 machines.

Windows metafiles are image files used by popular applications such as
Microsoft Word. So far WMF exploits have been typically used to install
spyware and adware although the threat of virus and worm exploits remain.

Users can be infected simply by visiting a web site with an image file
containing the WMF exploit. Internet Explorer users are at the greatest risk
of automatic infection while Firefox and Opera browser users are prompted
with a question whether they'd like to open the WMF image or not. They get
infected too if they answer 'Yes'.

Microsoft and CERT.ORG issued bulletins on the Windows Metafile vulnerability
and also announced a workaround while Microsoft is creating a patch.
Microsoft's confirms that the vulnerability applies to all the main versions
of Windows: Windows ME, Windows 2000, Windows XP and Windows 2003. This means
there are hundreds of millions of vulnerable computers at the moment.

As a precaution, F-Secure recommends administrators to block access to all
WMF files at HTTP proxy and SMTP level. Consumers are also advised to enable
their Windows automatic update system, reject any emails sent to them with
WMF or other dubious-looking attachments and to ensure that their virus
protection is up to date.

F-Secure Anti-Virus detects the offending WMF files with generic detection
either as PFV-Exploit or Exploit.Win32.IMG-WMF.

Speaking about the case, Chief Research Officer at F-Secure, Mikko Hypponen
said: "So far, we've only seen this exploit being used to install spyware or
fake antispyware and antivirus software on the affected machines. I'm afraid
we'll see real viruses using this soon. We've seen 70 different versions of
malicious WMF files so far."

Hypponen pointed out that the WMF exploit has been used with a clear criminal
motivation to install spyware and to dupe ordinary consumers into purchasing
fake security products for their computers:

Until a patch is issued, Hypponen recommended administrators to filter the
following domains at corporate firewalls:

toolbarbiz[dot]biz
toolbarsite[dot]biz
toolbartraff[dot]biz
toolbarurl[dot]biz
buytoolbar[dot]biz
buytraff[dot]biz
iframebiz[dot]biz
iframecash[dot]biz
iframesite[dot]biz
iframetraff[dot]biz
iframeurl[dot]biz
freecat[dot]biz

For updates on the WMF vulnerability, please check the F-Secure Viruslab
blog, which broke the news on 28th of December:
http://www.f-secure.com/weblog/
[/quote]

- Collapse -
Windows Metafile Exploit Mitigation By Unregistering Shimgvw
Dec 30, 2005 2:41PM PST
- Collapse -
(NT) (NT) Thanks Marianna for the info.
Dec 30, 2005 2:43PM PST
- Collapse -
Are limited accounts in XP vulnerable?
Dec 30, 2005 2:51PM PST

Since limited accounts in Windows XP cannot install new programs, are they vulnerable to this threat of automatic download (and installation?)of malicious software?

"But as far as using IE goes, download of malicious software is automatic, happening immediately upon going to the site, pointed out Alex Eckelberry, president of Sunbelt Software." quoted from eWeek.com article "Critical Impact: Windows Metafile Flaw a 'Zero-Day Exploit'
By Lisa Vaas
December 28, 2005"

- Collapse -
(NT) (NT) YES!!!
Dec 30, 2005 4:20PM PST
- Collapse -
Ups.. sorry.. YES!! because..
Dec 30, 2005 4:25PM PST

Windows xp Limited user is NOT totally blocked you from installing something ... they can... and many software can be install using limited user account.

In short, limited means LIMITED, only a limitation on what you can do.

- Collapse -
thank god for f-secure
Jan 1, 2006 11:48AM PST

I wouldn't leave home without it. I believe their folks were also involved in unmasking the sony rootkit fiasco.

- Collapse -
Why do zero-day exploits happen?
Dec 30, 2005 5:57PM PST

According to the Washington Post, the first viruses to exploit the WMF security flaw appeared a few hours after instructions on how to exploit the security flaw appeared online. I've heard of this happening before, and I don't understand it. Can someone please explain why this happens? Maybe I don't understand something about the computer security process. Virus writers watch the security flaw websites, waiting for new exploits. Isn't it obvious that if you discover a new flaw, you shouldn't post it on the internet until the vendor has been contacted, and a patch or workaround has been developed?

- Collapse -
I have been ranting about this exact same thing.
Jan 5, 2006 11:46PM PST

> Virus writers watch the security flaw websites, waiting for new exploits.

If they (the security houses) would just keep their yaps shut about the vulnerabilities and notify the software manufacturer, this sort of problem would be minimized. After the fixes have been posted, consumers could be notified, and they would have a direct route to go to rectify the problem. Leaving a 24-72 hour gap between announcement and fix is just asking for trouble.

- Collapse -
Rant no more
Jan 6, 2006 10:10AM PST

Maybe its time for the ranters to move to a more secure OS and get some peace of mind. Linux is no longer for the geeks alone, but is a very mature desktop OS now. I have been using Mandrake (now Mandriva) for the last 4 years as a desktop for my business and the latest release is breathtaking in its form and function. Of copurse I have no virus scanner for my computer but I do sit behind a Linux Firewall. Virus scares and email dramas are not part of my experience.

Get Linux and get your life back.

- Collapse -
i agree
Jan 6, 2006 6:36AM PST

why do companies issue how to exploit the errors and where they are without alerting the comanies. Sombody should stop this now they are virtually say please take advantage of them.

- Collapse -
Because they're the only way to fix anything
Jan 6, 2006 10:04AM PST

People tried reporting it directly to Micro$oft back in the old days and were completely ignored. (The various buffer issues in Win95 spring immediately to mind.)
The general idea is at least this way Microsoft knows what screwup of theirs is causing the problem, and can attempt to fix it sooner or later instead of resorting to trial or error.
If it *wasn't* made public, then someone could do huge amounts of damage without anyone knowing how or even being able to discover how, meaning the damage would be utterly limitless.
Companies are *not* going to fix anything until it causes huge problems. Problems for them, anyway. For all anyone knows they sent the information to Microsoft months ago and they just hoped it wouldn't be that big a deal.
Had the people that found the exploit attempted to make their own patch to fix it, btw, Microsoft would've probably sued them into oblivion.

- Collapse -
New IM Worm Exploiting WMF Vulnerability
Dec 31, 2005 1:14AM PST
- Collapse -
A-Squared Update today
Dec 31, 2005 6:27AM PST

Hi All,

Todays A-Squared update provided a definition for the WMF vulnerability I believe.

Steve

- Collapse -
Yes it did and I posted it in
Dec 31, 2005 6:48AM PST

the updates thread. The problem now is there are new threats being released constantly now. The Infocon threat level because of this went from green to yellow, then back to green the last couple of days. Now it is back to yellow. More is here.This is the very latest.
http://isc.sans.org/diary.php?n&storyid=992

- Collapse -
Fact!!! I Got Hit With It At 4:20AM EST. Auto Launch via WMF
Dec 31, 2005 7:03PM PST

instantly upon loading of page.Was browsing, no E-mail involved. Luckily I had Spybot Teatimer active at the time. It didn't prevent the infection but aborted many of it's intended paths making it easier to remove.
I was literally clicking "deny" Tea Timer pop-up registry changes as fast as I could for about 20 seconds before I decided to disconnect LAN . In my case the Tea Timer notifications balloons, after 5 seconds, had completely covered all desktop icons(including system bar area which got the infected windows note & red X) relating to disabling LAN. Additionally got several AVG alerts at same time.
I had the main problem stopped and removed with-in 15 minutes. Took several hours to re-scan & fix sys files damaged beyond repair needing replacement from Check Disc Error fix/repair. Mostly to assure myself it was completely gone.
Basically, the WMF exploit was used to send a full load of Cool Web Search troubles to me. These included:Start Page EH Hijack, Spy Sheriff, Smitfraud, Searchklick, Windows Explorer Exe & Active Desktop corruptors.
Basically fix used (in order) was:
Let AVG heal file, Run CCleaner with 48 hour Temp File Protection OFF, Let Spybot fix 84 problems found, which included removal of a main sys file causing shutdown inability in normal methods,(Spybot warned of this). Since Win infection balloon & sys bar X still remained, I did System Restore back 24 hours. This removed those 2 items. Note: At NO time did I click the X to get "cure" thankfully(knew better from here).
At this point ran CWShredder & F-Secure Backlight Root-kit Revealer which both reported no infection left. Ran 1 more Spybot Scan (safe mode) & full AVG Scan. Convinced now clean, ran CheckDisk Repair to get normal start-up & shutdown back. All A-OK !!!
I believe basically that Tea Timer messed up CWS install enough that AVG & Spybot could remove the problem(+/- Active Desktop fixed w/SysRestore).
I consider that foregoing let me get off Extremely Lightly (hard to believe) this time!!!!
Thanks for the Hotfix Link, Marianna. I will be definitely trying to install it tonight on both machines & send to my daughter for hers.
Unfortunately, it all happened so fast that I don't know which site it was (CCleaner wiped History also).
Given how hard others are finding it to remove, I am indeed blessed with a Happy New Year!!! Grin

- Collapse -
Wow!
Dec 31, 2005 8:55PM PST

Thanks for the info. Glad to hear everything is okay now. Happy Happy New Year!

- Collapse -
(NT) (NT) Thanks & A Happy One to You & All Aboard!
Jan 1, 2006 2:59PM PST
- Collapse -
wow you are lucky
Jan 6, 2006 6:32AM PST

I got hit with the same virus and it totally wiped out my computer. It got ahead of me and finally i decided the only option was wipe the hard drive. Then i had to reinstall the operating system and other applications took me all weekend. You are really lucky

- Collapse -
Thanks to Spybots TeaTimer!! Some Other Progs Have ....
Jan 6, 2006 1:52PM PST

similar functions of locking down system settings & blocking changes without you specific permission.
The thing that caught me off guard really was my inability to disconnect from net as both my disable connection icons wouldn't function. Did a hard crash with switch on power supply. Unfortunately it took me several seconds to realize that I was still connected and being downloaded to.
I also have to thank this board & it's contributors & moderators for the knowledge I've gained here that let me learn what to do in such a situation: Pull the Plug!!!
(LOL!). Seriously, these boards should qualify as Universities for the knowledge they impart. Grin

- Collapse -
Temporary Fix
Dec 31, 2005 7:04PM PST
- Collapse -
i did use it
Jan 1, 2006 1:12AM PST

no probs here but who knows

- Collapse -
Updated version of Ilfak Guilfanov's patch / ,msi file
Jan 1, 2006 8:11AM PST

Published: 2006-01-01,
Last Updated: 2006-01-01 23:13:01 UTC by Tom Liston (Version: 2(click to highlight changes))

Ilfak Guilfanov has released an updated version of his unofficial patch for the Window's WMF issue. We have reverse engineered, reviewed, and vetted the version here. Note: If you've already successfully installed the patch, this new version adds nothing new. It only adds code to make it able to install on some other very specific configurations and code to recognize when the patch has already been installed.

http://isc.sans.org/diary.php?storyid=999

- Collapse -
Temp Patch
Jan 6, 2006 10:23AM PST

Hi, if the temp patch is installed and all is well, is there any reason to download the MS patch? If so, does the temp patch have to be uninstalled first? Thanks.

- Collapse -
Here are the directions from the
Jan 6, 2006 10:48AM PST
- Collapse -
(NT) (NT) Thanks Roddy. All done.
Jan 6, 2006 12:10PM PST
- Collapse -
(NT) (NT) You're welcome Sasha
Jan 6, 2006 9:44PM PST
- Collapse -
I Have Installed Hot Patch. Accepted on SP1 & SP2. No.....
Jan 1, 2006 3:05PM PST

difficulties going in. Have tried local Dvd player: Works. Haven't yet tried Win Cinema Mgr related services like WMP. Worth a shot (compared..). Grin

- Collapse -
Here is the latest info on this
Dec 31, 2005 9:28PM PST
- Collapse -
Most recent from ISC..
Jan 1, 2006 7:17AM PST