Microsoft has released the patch for the WMF vulnerability that’s been all over the news early. It was released to http://windowsupdate.microsoft.com ahead of the previously announced January 10th “patch Tuesday”.
Congrats to Microsoft for getting this out the door early. That should go a long ways to blunting the attacks that are making use of this vulnerability.
I’m away from my main PC right now, so I don’t have much other detail and will try to update more as I can.
The security fix is covering as well and Brian did predict MS would release the patch early given all the bad press over waiting until Patch day.
Here’s a walk through of the install suggestions if you have the third party patch and registry work around:
1. Reboot your system to clear any vulnerable files from memory
2. Download and apply the new patch
4. If you installed one of the unofficial, third-party patches, you may uninstall it by using Add/Remove Programs.
5. Re-register the .dll if you previously unregistered it. To do this:
* Click Start, click Run, type “regsvr32 %windir%system32shimgvw.dll” (without the quotation marks), and then click OK.
* A dialog box appears to confirm that the un-registration process has succeeded. Click OK to close the dialog box.
6. Reboot one more time just for good measure
Looks as though it was released a bit before 5 PM EST this afternoon. Sans has moved the Infocon back down to green for the first time in several days. (I can’t recall how many days straight it’s been at yellow, but it’s the longest stretch at yellow that I can recall.)
Related PostsRelated Posts
- Microsoft's speed to get security patches out Brian Krebs at the Security Fix has done an interesting study related to how long it takes Microsoft to release a security fix for a problem, starting from the time they are notified of the security vulnerability. For the most part, 134.5 days has been the window between notification and......
- Microsoft's unpatched security bugs George Ou at ZDnet is mystified (as many of us are) at why Microsoft can't patch ALL their security vulnerabilities. Most of the unpatched vulnerabilities are considered minor (as was the 6 month old bug that in the last week was discovered could be exploited for more than a Denial......
- Zero-day ( 0-day) Microsoft Word exploit There was some news on this last night at Incidents.org, today F-secure has some details as well on the trojan that's dropped in this circulating, exploit. It seems as though the initial attack was very targetted against a specific organization. Antivirus packages did not recognize the trojan that the exploit......
- Indiana 9th District House Race Updates: Barron Hill and Todd Young To view other TCJ Research Polls released today, click HERE. To read our full analysis of how and why Republicans will take the Senate, click HERE. Republican Todd Young faces off against Democrat Barron Hill in this highly contested house race. Incumbent Hill has been under fire recently for his comments at......
- Microsoft to Improve User Access Control in Windows 7 I was just reading a Slashdot article about Microsoft improving User Access Control (UAC) in Windows 7. In the cited PC Pro article, Microsoft engineer Ben Fathi says: We've heard loud and clear that you are frustrated. You find the prompts too frequent, annoying, and confusing. We still want to......
- PersonalizationMall.com PersonalizationMall.com was founded in 1998 with headquarters located in Burr Ridge, Illinois. Our goal is to serve our customers by making personalized gift buying quick and easy. Our revolutionary preview technology takes the guess work out of personalization, by allowing you to see what your gift will look like,......
- Update on the WMF exploit – more sites to block
- Workaround for the critical WMF zero-day exploit
- WMF exploit situation summary…
- WMF 0-day update
- Microsoft releases official VML patch!!