and the script kiddies rejoiced… It reads as though Metasploit 3 will make it easier than ever for script kiddies everywhere to take full advantage of the local wireless hotspots. Of course, metasploit has it’s good uses by people legitimately testing systems that they are responsible for, for vulnerabilities. But, it does make it very easy for the less skilled to pull off some exploits.
Tag: WMF
-
Another WMF exploit??
Security Focus has a brief that refers to a WMF zero-day vulnerability that affects Windows XP SP2. I suspect this may get a bit of coverage throughout the day. It appears as though there are actually 3 issues cited.
-
Qemu 0.8.1 (with kqemu 1.3.0pre7)
While I was testing out the “single cut and paste” linux vnc remote desktop sharing script and x11vnc binary…. I spent a fair amount of time booting up livecd’s n qemu to test various distributions/ages of linux setups to see how compatible things were. I had not checked in at the qemu site in quite a while (a few months), but there was a new version out… in fact, I think 0.7.1 is what I was running previously, so I missed 0.7.2 and 0.8.0… Anyway, I’m running 0.8.1 now and I compiled kqemu as well (now at 1.3.0pre7)…. wow qemu has made great strides (with kqemu) since 0.7.1 ….
-
WordPress trackback problem FINALLY SOLVED….
For around 3-4 months now I’ve had a REALLY annoying problem with the wordpress install on this site. Trackbacks suddenly stopped working. Somewhere around my 800th post or so while the WMF vulnerability was circulating (between Christmas and New Years) and I was typing furiously – poof…. suddenly trackbacks stopped going out. (Incoming trackbacks seemed to work just fine…) What’s had me stumped for so long is that I host 2 (now three) other sites off the same domain and I haven’t had a problem with ANY of those sending pingbacks or trackbacks.
-
Microsoft was aware of the WMF vulnerability “for years”
Bugtraq has an interesting post which picks up on a note in Stephen Toulouse’s latest entry on the WMF vulnerability. When I first read the post I was more interested in the way he was responding to allegations of the flaw being an intentional backdoor, but the above bugtraq post points out and makes points on an implication that I missed….. (emphasis is mine…)
“The potential danger of this type of metafile record was
recognized and some applications (Internet Explorer, notably)
will not process any metafile record of type META_ESCAPE,
the overall type of the SetAbortProc record.” -
WMF patch is the first patch for Microsoft Vista
It seems the WMF patch that was recently released for Windows 2000 and XP (and 2003) has been ported to Microsoft Windows Vista Beta…. This makes it the first security patch for Vista. eweek has an article on the issue. So, if you’re beta testing Vista, get it updated ASAP. Hopefully though, if you’re beta-testing it’s not a production machine and no great loss if you get infested with beaucoup spyware….
-
Another Win98 patch for WMF vulnerability
There’s another patch for those Win98 users that are nervous about the WMF vulnerability that was announced at the tail end of the year. This site has made the patched version of gdi32.dll available to any and all. Their patch is open source. They basically say “it works for them…” no warranties. Steve Gibson has also said that he’ll be writing a Win9x patch.
-
MS responds to “intentional backdoor”, WMF claim
Microsoft is disputing claims by Steve Gibson, that the WMF vulnerability was an intentionally placed backdoor. There is a response to the claims in the Microsoft Security Incident Response blog. Apparently since the SetAbortProc procedure relates to printing, previous versions of Windows ignored the call unless printing was involved. (Why did windows start paying attention to it otherwise?)
-
WMF vulnerability not an accident? Was it an intentional backdoor?
I’m not quite sure if I’m willing to attribute to design, what I could attribute to a mistake… but, slashdot has pointed out that Steve Gibson in his latest Security Now! podcast (link is to transcript), is suggesting that it appears as though the WMF vulnerability of recent weeks appears (to him) to have been INTENTIONALLY included as a means of a remote backdoor.
-
Codeweavers fixes WMF vulnerability in Crossover Office
There has been a bugfix release to Crossover Office, released by Codeweavers. Crossover Office is an offshoot of the Wine project, which is a windows compatibility suite for Linux, to allow Windows applications to run under modern Linux operating systems. It was found recently that wine suffered from the WMF vulnerability just the same as Windows. The new release is 5.0.1, notes on what has changed can be found here.