Microsoft was aware of the WMF vulnerability “for years”



Bugtraq has an interesting post which picks up on a note in Stephen Toulouse’s latest entry on the WMF vulnerability. When I first read the post I was more interested in the way he was responding to allegations of the flaw being an intentional backdoor, but the above bugtraq post points out and makes points on an implication that I missed….. (emphasis is mine…)

“The potential danger of this type of metafile record was
recognized
and some applications (Internet Explorer, notably)
will not process any metafile record of type META_ESCAPE,
the overall type of the SetAbortProc record.”


So, if it’s a potential danger – why hasn’t it been a policy across all applications and not just Internet Explorer?….

Anyway, the post, by Richard M. Smith makes some interesting points…

1. Given the obvious dangers with SetAbortProc records, why
didn’t Microsoft simply disable the feature in the Windows
operating system altogether and come up alternate for
aborting printing of WMF files? Why were all the inadequate
work-arounds in application code pursued instead?

2. How come word about the dangers of the WMF file
format did not make it to the Windows NT, 2000, and XP
development teams as well as the team responsible for
the Picture and FAX viewer?

3. Given the history of problems with WMF files, why
hasn’t support for them been removed from Internet
Explorer? Also shouldn’t WMF files be marked in
the registry as not safe-for-downloading?

What’s worrisome of course, is we KNOW about this one now, I wonder how many things like this are out there that we aren’t yet publicly aware of. This is again, a real problem with the closed source approach, you’re relying on information to stay secret that’s in a product that is widely available… or at least hope that the makers of the product are aware of AND FIX any vulnerabilities before it’s widely known.

What this says to me is that Microsoft, being aware of the “potential danger” COULD have patched this a long time ago. They probably chose not to, as they do with many issues because, it was “not actively being exploited”.

How many other areas does Microsoft see “potential dangers” in that they don’t publicly talking about?

What really gets under my skin about this is finding this out not far on the heels of all the articles that I read about “Windows more secure than Linux” and the ummm…. various interpretations of US-CERT’s vulnerability announcements. I’ve seen the bug reports of many Linux security vulnerabilities, read the mailing list discussions, etc. etc. and by and large when ANYONE says, “you know this….. could be a problem, someone MAY be able to find a way to use this to run code| escalate privilige| crash a system|etc…” it is taken VERY seriously. I can’t think of one security bug that I’ve seen an open source developer say, “well…. no one seems to be exploiting it, so we’ll just leave it there….” They usually do a patch to fix it and move on (after releasing a notice for everyone to step up to the newest maintenance version….) /vent…

Related Posts

Blog Traffic Exchange Related Posts
  • Network Security - Arp spoofing series I think I've wrapped up the series on arp spoofing and it's implications for network security. I know there's nothing earth shattering here, most network security types are well aware of the problems (and perhaps aware of more sophisticated solutions?). For some though, this series is likely an eye opener......
  • WMF exploit situation summary... Since there's been quite a bit of flux the last couple of days I thought I'd try to "reset" the situation and give a general overview of where we stand now with regards to the recent WMF zero-day exploit. 1st there is a vulnerability in the way Windows renders WMF......
  • Zotob worm bites big media outlets According to several reports there are several big media outlets seeing what is reported as the zotob worm which exploits a Microsoft Windows vulnerability (MS05-039) disclosed last week. There seems to be no better way for something to make the news than for it to affect the companies that bring......
Blog Traffic Exchange Related Websites
  • Facts about Coin Currency Collecting Coin collecting is rapidly becoming one of the most popular pass times in the United States. Hobbies like this always become more popular during the times when the economy has taken a hit. This is due to the fact that people get a renewed awareness about creative forms of investing......
  • World Wide Web Security Essentials Is Not A Real Spyware Remover. It Resembles The Functions And Looks World wide web Security Essentials is not a real spyware remover. It resembles the functions and looks of genuine spyware removal software but has no capacity to eliminate any virus, trojan or malware. Web Security Essentials is the newest addition to the growing list of rogue Antivirus programs. Internet Security......
  • Microsoft to Improve User Access Control in Windows 7 I was just reading a Slashdot article about Microsoft improving User Access Control (UAC) in Windows 7. In the cited PC Pro article, Microsoft engineer Ben Fathi says: We've heard loud and clear that you are frustrated. You find the prompts too frequent, annoying, and confusing. We still want to......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site