[ISN] Windows zero day nightmare exploited

From: InfoSec News (isn@private)
Date: Wed Dec 28 2005 - 11:19:42 PST


http://www.theinquirer.net/?article=28590

By INQUIRER staff
28 December 2005

F-SECURE, Bugtraq and a number of other security aware outfits have
warned of a zero day vulnerability that's being actively exploited as
we write.

Fully patched Windows XP SP2 machines are vulnerable and there's no
known fix as yet.

A number of trojans are being distributed using the vulnerability,
related to Windows' image rendering.

Have a look, for example, at the F-Secure site, here [1], for more
information.

F-Secure says you can get blatted if you visit a site with an image
file containing the exploit. IE users may automatically be infected.  
Firefox users can get infected if the image file is downloaded.  
There's more solid advice at F-Secure. We await a patch from
Microsoft. µ

* UPDATE Ken Dunham, director at iDefense, said the zero day WMF
exploitation threat affecting fully patched versions of XP and Windows
2003 Web Server is underway. It has been exploited by multiple sites
and added to the infamous Meetasploit tools. Attacks in the last 12
hours, said Dunham, have been minor. But systems so far attacked have
shown clear signs of infection. He warned further attacks were likely.

There is no solid workaround against emerging WMF exploits. Locking
down WMF files on the gateway and building network detection
signatures may mitigate known threats. The impact of attacks may also
increase.

[1] http://www.f-secure.com/weblog/



_________________________________________
Earn your Master's degree in Information Security ONLINE
www.msia.norwich.edu/csi
Study IA management practices and the latest infosec issues.
Norwich University is an NSA Center of Excellence.



This archive was generated by hypermail 2.1.3 : Fri Dec 30 2005 - 18:56:21 PST