There’s another security warning out related to specially crafted image files. This time it’s targetted at the blackberry, which is a small portable email/pda device. Basically a corrupted TIFF may lead the user to be unable to view other image attachments. The US-CERT advisory seems to indicate that remote code execution could be possible, although there is no comment to this issue from the makers, Research in Motion.
Month: January 2006
-
WMF patch from Microsoft expected January 10th
The Microsoft security bulletin on the WMF vulnerability has been updated to indicate that Microsoft expects to release an update for the issue in their regular patch release on January 10th. The first couple paragraphs strike me as a bit defensive. Explaining about their immediate mobilization of Incident Response and immediate work on a patch, in addition to the explanation of extensive testing of the patch in 23 languages….
-
Metasploit
I had hoped to do an article on metasploit in the not too distant future, but not as early as tonight…. However, I’ve made a couple of references to it in previous posts which, well, it would be nice if I’d already given a bit of information about metasploit in general. For starters, metasploit is considered a “framework” for exploit modules and payload modules. Much like real weapons, knives, guns…. there are good uses and there are bad uses. It can be used by a network/security auditor to check for vulnerable systems. It could also be used by a cracker to exploit systems remotely. There’s a fine line.
-
Moving from Evolution to Konqueror
After several weeks of good behaviour from Evolution 2.4 since the Mandriva 2006 upgrade, I started getting a wierd error on sending messages *(Mail From response Error Unknown). Nothing within my settings for Evolution had changed since the night before when things worked… I tested with Kontact and was able to send mail, closed it, opened it, bonobo-slay’ed it… still getting the error, so… since I was on the fence as to whether or not I was going to migrate to Kontact, I went ahead with it. I’ve already covered moving the calendar and contact (addressbook) information in a previous post. So this will be on moving the messages.
-
WMF unofficial patch updated
There’s been an update to the unofficial patch for the WMF (Windows MetaFile) vulnerability. The main change appears to be some options to allow for quiet installation (unattended) to help administrators in large environments try to roll the patch out in automated login scripts/etc.
It can be found here or at the incidents.org site.
-
Virtual machine as a safe browsing environment
I mentioned this in my summary yesterday morning as a possible workaround until there are patches for the WMF vulnerability that’s been big news the last week. I notice that incidents.org has mentioned it too as a possibility today. VMware has released VMPLayer as a free way of running premade virtual machines.
-
Windows 98 and the WMF exploit
I’ve seen breathless headlines that say “Windows PCs face ‘huge’ virus threat; Affects every MICROSOFT OS shipped since 1990…” and really would like to try to clarify (again) what the situation is. Yes, the bug or vulnerability that’s currently being exploited exists as far back as Windows 3.0, but as far as I can tell there is not an active, current exploit that is taking advantage of this flaw in earlier versions of windows. Currently the exploit only seems to affect Windows 2000, XP, and Vista.
-
WMF exploit virus detection revisited
Yesterday, when I was testing the WMF exploit against a Windows 98 virtual machine, I sent samples through virus total and the only antivirus product to detect each of them was “TheHacker” from hacksoft. This evening I was revisiting the exploit (with the new rule for metasploit) and saved 20 samples which I also tested with virustotal. The results this evening are better. This evening 4 antivirus products detected each one.
-
The D-Link DWL-800AP+ as a wireless repeater to extend wireless range – Part 7
So, according to D-Link there is a short list of access points that the DWL-800AP+ will repeat for. They are all d-link branded access points. It seems that there have been firmware updates to improve the compatibility with more models (of d-link access points.) Some of the incompatibilities have been with WEP encryption from what I’ve read.
-
The D-Link DWL-800AP+ as a wireless repeater to extend wireless range – Part 6
Ok, so here’s the synopsis… I’ve spent the last few articles setting up a D-link DWL-800AP+ as a repeater for a linksys WAP11 (v. 1.1) As of the end of the last entry I had a bit of a problem with WEP but that seems to have been resolved now and here I am to fill you in on what went wrong. It was really a simple mistake. When I copied and pasted over from the linksys….