Viruses now in jpg files? Gif files?

W

Wilbur Post

Does this mean we shouldn't copy or dl image files from newsgroups or
copy jpgs from the net, or save web pages in html or mht format?
Will the MS patch cover it all?

http://news.ft.com/cms/s/0d644d5e-7bb3-11da-ab8e-0000779e2340.html


Windows PCs face ‘huge’ virus threat
By Kevin Allison in San Francisco
Published: January 2 2006 18:18 | Last updated: January 3 2006 12:01

Computer security experts were grappling with the threat of a new
weakness in Microsoft’s Windows operating system that could put hundreds
of millions of PCs at risk of infection by spyware or viruses.



The news marks the latest security setback for Microsoft, the world’s
biggest software company, whose Windows operating system is a favourite
target for hackers.

“The potential [security threat] is huge,” said Mikko Hyppönen, chief
research officer at F-Secure, an antivirus company. “It’s probably bigger
than for any other vulnerability we’ve seen. Any version of Windows is
vulnerable right now.”

The flaw, which allows hackers to infect computers using programs
maliciously inserted into seemingly innocuous image files, was first
discovered last week. But the potential for damaging attacks increased
dramatically at the weekend after a group of computer hackers published
the source code they used to exploit it. Unlike most attacks, which
require victims to download or execute a suspect file, the new
vulnerability makes it possible for users to infect their computers with
spyware or a virus simply by viewing a web page, e-mail or instant
message that contains a contaminated image.

“We haven’t seen anything that bad yet, but multiple individuals and
groups are exploiting this vulnerability,” Mr Hyppönen said. He said that
every Windows system shipped since 1990 contained the flaw.

Microsoft said in a security bulletin on its website that it was aware
that the vulnerability was being actively exploited. However an official
patch to correct the flaw was not expected to be released until January
10.

In the meantime, Microsoft said it was urging customers to be careful
opening e-mail or following web links from untrusted sources, and
provided instructions for a “workaround” that would reduce the likelihood
of attacks.

Meanwhile, some security experts were urging system administrators to
take the unusual step of installing an unofficial patch created at the
weekend by Ilfak Guilfanov, a Russian computer programmer.

Concerns remain that without an official patch, many corporate
information technology systems could remain vulnerable as employees
trickle back to work after the holiday weekend.

“We’ve received many e-mails from people saying that no one in a
corporate environment will find using an unofficial patch acceptable,”
wrote Tom Liston, a researcher at the Internet Storm Center, an antivirus
research group. Both ISC and F-Secure have endorsed the unofficial fix.

In its security bulletin, Microsoft made a general recommendation against
unofficial patches, saying it was “best practice to utilise security
updates for software vulnerabilities from the original vendor of the
software”.

Microsoft routinely identifies or receives reports of security weaknesses
but most such vulnerabilities are limited to a particular version of the
Windows operating system or other piece of Microsoft software. In recent
weeks, the company has been touting its progress in combating security
threats.

The company could not be reached on Monday for comment
 
O

Offbreed

Virus said:
Any version? Here is the IT industry falling right in line with
Microsoft, making sure that no-one knows that Windows 98 is immune to
this problem.

For now. Now the idea is out, we can expect malware writers to start
sifting through 98 for similar flaws.

<G> I wonder if 3.11 is vulnerable?
 
V

Virus Guy

Windows PCs face ‘huge’ virus threat
By Kevin Allison in San Francisco

“The potential [security threat] is huge,” said Mikko Hyppönen,
chief research officer at F-Secure, an antivirus company. “It’s
probably bigger than for any other vulnerability we’ve seen. Any
version of Windows is vulnerable right now.”

Any version? Here is the IT industry falling right in line with
Microsoft, making sure that no-one knows that Windows 98 is immune to
this problem.

And oh, by the way, keep using XP. Remember, it's supported by
Microsoft, dontcha know. It still carries the Micro$haft seal of
approval.

Geeze, when will people learn.

The X in XP stands for eXtra, as in eXtra Processes - those being all
the malware that is running on millions of XP systems world wide.

XP is the malware that should be gotten rid of on people's PC's.
 
W

Wilbur Post

Virus Guy said:
Any version? Here is the IT industry falling right in line with
Microsoft, making sure that no-one knows that Windows 98 is immune to
this problem.

And oh, by the way, keep using XP. Remember, it's supported by
Microsoft, dontcha know. It still carries the Micro$haft seal of
approval.

Geeze, when will people learn.

The X in XP stands for eXtra, as in eXtra Processes - those being all
the malware that is running on millions of XP systems world wide.

XP is the malware that should be gotten rid of on people's PC's.

opinion of Win 2000 pro?
 
J

Juergen Nieveler

Virus Guy said:
Any version? Here is the IT industry falling right in line with
Microsoft, making sure that no-one knows that Windows 98 is immune to
this problem.

Actually, the WMF "feature" exists in all versions of Windows back to
Windows 3.0 :)

You are correct, though, that the payload so far found in manipulated
images has been tailored for XP and 2k.

Juergen Nieveler
 
D

David H. Lipman

From: "Juergen Nieveler" <[email protected]>

|
| Actually, the WMF "feature" exists in all versions of Windows back to
| Windows 3.0 :)
|
| You are correct, though, that the payload so far found in manipulated
| images has been tailored for XP and 2k.
|
| Juergen Nieveler

One payload will cause a compramised PC to download and install a variant of the
Backdoor.Haxdoor Trojan which uses RootKit technology.
 
A

Art

Windows PCs face ‘huge’ virus threat
By Kevin Allison in San Francisco

“The potential [security threat] is huge,” said Mikko Hyppönen,
chief research officer at F-Secure, an antivirus company. “It’s
probably bigger than for any other vulnerability we’ve seen. Any
version of Windows is vulnerable right now.”

Any version? Here is the IT industry falling right in line with
Microsoft, making sure that no-one knows that Windows 98 is immune to
this problem.

Have you tested this theory?

Art

http://home.epix.net/~artnpeg
 
M

Mr. Uh Clem

Juergen said:
Actually, the WMF "feature" exists in all versions of Windows back to
Windows 3.0 :)

http://isc.sans.org/diary.php?storyid=994

(1 Jan)

* What versions of Windows are affected?

Windows XP, (SP1 and SP2), Windows 2003 are affected by the currently
circulating exploits. Other versions may be affected to some extent.
Mac OS-X, Unix or BSD is not affected.

Note: If you're still running on Win98/ME, this is a watershed moment:
we believe (untested) that your system is vulnerable and there will be
no patch from MS. Your mitigation options are very limited. You really
need to upgrade.
 
M

myself

Windows PCs face ‘huge’ virus threat
By Kevin Allison in San Francisco

“The potential [security threat] is huge,” said Mikko Hyppönen,
chief research officer at F-Secure, an antivirus company. “It’s
probably bigger than for any other vulnerability we’ve seen. Any
version of Windows is vulnerable right now.”

Any version? Here is the IT industry falling right in line with
Microsoft, making sure that no-one knows that Windows 98 is immune to
this problem.

And oh, by the way, keep using XP. Remember, it's supported by
Microsoft, dontcha know. It still carries the Micro$haft seal of
approval.

Geeze, when will people learn.

The X in XP stands for eXtra, as in eXtra Processes - those being all
the malware that is running on millions of XP systems world wide.

XP is the malware that should be gotten rid of on people's PC's.

I wont use XP at any cost. I use Win98 and that's it. My next
computer will be a Macintosh.
 
W

Wilbur Post

Gawd, let's hope so!


Shane

so what's the answer? Shift to Linux? Has anyone written the definitive
Linux system that can be sold OTC, with patches if necessary?

This whole image file problem could be a boon for Apple and the Mac.
 
T

Todd H.

Wilbur Post said:
so what's the answer? Shift to Linux? Has anyone written the
definitive Linux system that can be sold OTC, with patches if
necessary?

Yup.
http://www.walmart.com/catalog/product.do?product_id=3762911

Definitive? I dunno. Cheap and works, yes.
This whole image file problem could be a boon for Apple and the Mac.

Could be, but I suspect it won't be. Unfortunately. I know my work
fixing peoples screwed up computers would be a lot less interesting if
they'd go that route.
 
D

Default User

Will the MS patch cover it all?

No.

Additional protection can be gained by enabling DEP on Windows XP SP2 or
2003 Server OS.

http://support.microsoft.com/kb/875352#kb2
"The primary benefit of DEP is that it helps prevent code execution from
data pages, such as the default heap pages, various stack pages, and memory
pool pages. Typically, code is not executed from the default heap and the
stack. Hardware-enforced DEP detects code that is running from these
locations and raises an exception when execution occurs. If the exception
is unhandled, the process will be stopped. Execution of code from protected
memory in kernel mode causes a Stop error.

DEP can help block a class of security intrusions. Specifically, DEP can
help block a malicious program in which a virus or other type of attack has
injected a process with additional code and then tries to run the injected
code. On a system with DEP, execution of the injected code causes an
exception. Software-enforced DEP can help block programs that take
advantage of exception-handling mechanisms in Windows."


Your best bet is to "turn on DEP for all programs".

There is still no guarantees with DEP, but it is a far more proactive way
of blocking zero_day_vulnerabilities than waiting for M$ to create a patch.
 
I

Ian Kenefick

Default said:
Your best bet is to "turn on DEP for all programs".

There is still no guarantees with DEP, but it is a far more proactive way
of blocking zero_day_vulnerabilities than waiting for M$ to create a patch.

Since ASPacked files are an exception to this protection it is highly
unreliable and not a way to protect against these exploits. The patch
issued by http://www.hexblog.com/2005/12/wmf_vuln.html is MUCH more
reliable solution and should be implemented.
 
D

Default User

Since ASPacked files are an exception to this protection it is highly
unreliable and not a way to protect against these exploits. The patch
issued by http://www.hexblog.com/2005/12/wmf_vuln.html is MUCH more
reliable solution and should be implemented.
[The above url is unreachable from my host due to security settings]

So, you are simply going to reject the use of DEP because ASP is still
vulnerable? That doesn't negate its usefulness, IMHO.
 
L

Leythos

so what's the answer? Shift to Linux? Has anyone written the definitive
Linux system that can be sold OTC, with patches if necessary?

This whole image file problem could be a boon for Apple and the Mac.

We've had kids and non-technical adults install Fedora Core 4 on
everything from P3/866 machines to P4/3.2 machines with common hardware
without any problems. The FC OS has it's own update tool that will
download and install fixes.
 
J

Juergen Nieveler

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top