Workaround for zeroday WMF exploit



It’s worth repeating a few things here. There is a nasty exploit in the way that WMF images are parsed in Windows. This means that WITHOUT user intervention a system can be remotely exploited and through that exploit various software (spyware, viruses, other malware) can be installed. There is no patch at this moment, I don’t know of my AV vendors that detect it (f-prot seems to according to their blog posts.) There is a workaround TO PREVENT INFECTION. If the system is already infected, reinstallation may be the only solution.


The workaround is posted various places, including the Sunbelt blog and basically disables the Windows picture and fax viewer. To workaround

From the command prompt, type REGSVR32 /U SHIMGVW.DLL.

The above can be copied/pasted directly into Start…Run…

This will also impact your ability to preview some images natively within windows. It’s a fair tradeoff to secure the system against this exploit. You DON’T want it and all the baggage it brings. It sounds like it’s already been bundled into metasploit. (An exploit detection program that has good uses or bad uses… Security auditing/vulnerability exploiting can be a fine line.)

It sounds as though the number of sites utilizing this are multiplying quickly. Webmail junk messages (and probably html formatted emails in traditional mail clients may also be a vector of attack.)

Related Posts

Blog Traffic Exchange Related Posts
  • WMF exploit through indexing software One of the vectors that has been mentioned early on is the infection of a system through the WMF exploit even when the exploited file was downloaded through a dos command shell. At first this seemed absurd, but it appeared that Google Desktop search was indexing files dynamically and once......
  • Workaround for the critical WMF zero-day exploit The Windows Meta File (WMF) zero-day (0-day) exploit is apparently, VERY nasty, no user intervention required (unless running firefox or opera). Just VISITING a malicous site (viewing a malicious email with image...) would be enough to get the system owned. It sounds as though a FULL reinstall is the best......
  • Wireless Driver Vulnerabilities There are a couple notes to pass along with regards to some pretty serious vulnerabilities in various wireless network adapter drivers. First, Sans has information on some Intel Centrino updates that resolve some vulnerabilities that would affect the Windows Centrino driver and the ProSet management software. F-secure chimes in on......
Blog Traffic Exchange Related Websites
  • Creating a Blog Carnival Although it may be entirely possible for a single person to handle all of the various requirements for when it comes to creating a Blog Carnival, it may be beneficial to create a joint effort with a handful of like minded individuals that can create and run the Blog Carnival......
  • Automated Blogging - Before Starting You Might Want To Know... Automated Blogging - Can You Really Earn Crazy Amounts Of Money? [/caption] This is a topic that I wanted to open up to discussion mainly because I have messed around with automated blogging in a couple of different niches and really am wondering: If there are people out there getting......
  • Design Blog Improvement When it comes to blog improvement, one of the considerations that you might want to make relates to the design of your blog, as changing up the design of your blog can also have an impact of the quality of your blog and the functionality of your blog as well.......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site