Microsoft has released the patch for the WMF vulnerability that’s been all over the news early. It was released to http://windowsupdate.microsoft.com ahead of the previously announced January 10th “patch Tuesday”.
Congrats to Microsoft for getting this out the door early. That should go a long ways to blunting the attacks that are making use of this vulnerability.
I’m away from my main PC right now, so I don’t have much other detail and will try to update more as I can.
The security fix is covering as well and Brian did predict MS would release the patch early given all the bad press over waiting until Patch day.
Here’s a walk through of the install suggestions if you have the third party patch and registry work around:
1. Reboot your system to clear any vulnerable files from memory
2. Download and apply the new patch
4. If you installed one of the unofficial, third-party patches, you may uninstall it by using Add/Remove Programs.
5. Re-register the .dll if you previously unregistered it. To do this:
* Click Start, click Run, type “regsvr32 %windir%system32shimgvw.dll” (without the quotation marks), and then click OK.
* A dialog box appears to confirm that the un-registration process has succeeded. Click OK to close the dialog box.
6. Reboot one more time just for good measure
Looks as though it was released a bit before 5 PM EST this afternoon. Sans has moved the Infocon back down to green for the first time in several days. (I can’t recall how many days straight it’s been at yellow, but it’s the longest stretch at yellow that I can recall.)
Related PostsRelated Posts
- Different attitudes towards upgrading and developing software So many times, even in the last few days, I have talked about keeping software up-to-date. For many people that means upgrading to the latest version of windows as soon as it comes out, or Office, or well... fill in the blank. It's a vicious cycle when you think about......
- Zero-day ( 0-day) Microsoft Word exploit There was some news on this last night at Incidents.org, today F-secure has some details as well on the trojan that's dropped in this circulating, exploit. It seems as though the initial attack was very targetted against a specific organization. Antivirus packages did not recognize the trojan that the exploit......
- Windows 98 and ME in final days of support (6 by my count) July 11th will mark the end of Microsoft's support for Windows 98 and ME. Which means that there will be no further security updates for those systems after that date. In SOME ways, those systems may find comfort in the security through obscurity approach as much malware MAY not run......
- Paying Debt Collection The FTC had over seventy thousand complaints in 2007 leveled against debt collectors, third party agencies that collect debts for various businesses and banks. It can go without saying that not all debt collectors follow the rules. Here is some info that can help you to deal with (or not......
- Microsoft’s Next Move for Windows - Samara Lynn Microsoft has bounced back into good grace from Windows Vista with its latest release of its operating system, Windows 7. Many Windows-based users have adopted Windows 7, either upgrading from Windows XP or scraping Vista. In an interesting article titled, “Will Windows 8 Be A Business-Only OS?” from PC Mag,......
- Remote reboot from MMC Have you ever needed to reboot a machine remotely? This is easy to do via MMC, the Microsoft Management Console. In XP, do the following. 1) Right click the My Computer icon and choose manage to bring up the MMC. 2) From there, go to the Action menu and choose......
- Update on the WMF exploit – more sites to block
- Workaround for the critical WMF zero-day exploit
- WMF exploit situation summary…
- WMF 0-day update
- Microsoft releases official VML patch!!