Skip to content or view screen version

WARNING! Indymedia images infected with windows exploit!

Virus Warning! | 04.01.2006 15:25 | Indymedia | Technology

Anyone using windows based operating systems should avoid using indymedia (and many many other sites) until they have installed the security patch expected to be issued by microsoft next week.

A previously unknown 'feature' of windows media formats has been exploited by malicious hackers that enables them to execute code on somebodies machine without their knowledge. All that is required is a windows machine to view a specially prepared image file and the embedded code will be run. These images are being uploaded to hundred of websites around the world and open pulishing sites such as indymedia are the most vunerable to the attacks.

Images contained in emails are also being used to infect machines that then become zombies used for mass commerical spamming, hired out to the highest bidder. Ironically it appear to be anti-capitalist sites including indymedia that are the delivery method of choice.

"The WMF vulnerability" probably affects more computers than any other security vulnerability, ever.

When Windows Metafiles were designed in late 1980s, a feature was included that allowed the image files to contain actual code. This code would be executed via a callback in special situations. This was not a bug; this was something which was needed at the time.

The feature now in the limelight is known as the Escape() function and especially the SetAbortProc subfunction. This function was designed to be called by Windows if a print job needed to be canceled during spooling.

This really means two things:
1) There are probably other vulnerable functions in WMF files in addition to SetAbortProc
2) This bug seems to affect all versions of Windows, starting from Windows 3.0 - shipped in 1990!

! Blocking files with the WMF extension doesn't help as exploited files can be rename as .JPG or .GIF etc and windows will automatically spot that they are WMF files and so render and execute the malicious code anyway!

Hackers take advantage of Windows WMF flaw

Tom Espiner
ZDNet UK
January 03, 2006, 18:20 GMT

Exploits for the Windows Metafile vulnerability are coming 'fast and furious', say experts, as businesses are warned to educate their users

Hackers are stepping up their attempts to exploit the WMF vulnerability that was discovered within Microsoft Windows last year, experts warned on Tuesday.

Security experts say the vulnerability is potentially very dangerous as conventional antivirus software and IDS signatures do not recognise malicious code that exploits it.

Exploit code is hidden within seemingly normal JPEG, GIF, or Bitmap files which can be spread through emails or instant messages. These files can also be embedded within a Web page, and security vendor Websense has warned that users need only visit a compromised or fake website to be attacked.

"The sites number in the hundreds, and they're still coming out fast and furious," said Dan Hubbard, senior director of security and research at Websense. "The potential for a major outbreak is there. There's no patch from Microsoft, and there are a number of kits online that allow easy exploit building."

Businesses should be aware that employees need educating about the danger from WMF exploits, said Hubbard, advising IT professionals to block picture files and restrict administrative access.

"Pictures are not seen as being dangerous by general users, and systems administrators don't normally block WMF files in email. You need to create very restrictive filters at your email gateway, and err on the side of caution," Hubbard explained.

The Internet Storm Center has advised businesses to use an unofficial patch developed by security software developer Ilfak Guilfanov, because the official Microsoft patch will not be available until next Tuesday.

"The Microsoft WMF vulnerability is bad. It is very, very bad." said Tom Liston of the Internet Storm Center. "This is a bad situation that will only get worse."

"On December 31st, we received word that a "new and improved" version of the WMF exploit had been published. This new exploit code generated WMF files that were sufficiently different that they bypassed nearly all AV and IDS signatures. Publishing exploit code such as this for an unpatched vulnerability on a holiday weekend is, without any doubt, a totally irresponsible act."

A Microsoft spokesperson recommended that businesses wait for a week for the official patch, as it could not guarantee third party updates would be effective.

"Microsoft recommends that customers download and deploy the security update for the WMF vulnerability that we are targeting for release on January 10, 2006. Microsoft cannot provide assurance for independent third party security updates," Microsoft said.

The Internet Storm Center felt that businesses could not afford to wait for the official patch.

"You cannot wait for the official MS patch, you cannot block this one at the border, and you cannot leave your systems unprotected," said Liston.

Instruct all your windows users to leave their email uncollected and avoid visiting websites that allow any users to upload images for public viewing until a microsoft patch has been released .

Virus Warning!

Additions

More info

04.01.2006 15:54

The threat is real, but as yet we are not aware of any image being uploaded to indymedia sites. Any that we hear of will be deleted. To let us know email imc-uk-tech [AT] lists.indymedia.org

In the meantime there are unofficial fixes available

 http://isc1.sans.org/diary.php?storyid=1010

 http://support.f-secure.com/enu/home/wmf_download.shtml

Another one is

START
From the Fsecure website here is the workaround to disable the
vulnerable poretion of Windows, should be done on all windows boxes
until a patched viewer is released:

Un-register the Windows Picture and Fax Viewer (Shimgvw.dll)

1. Click Start, click Run, type "regsvr32 -u %windir%\system32\shimgvw.dll" (without the quotation marks), and then click OK.

2. A dialog box appears to confirm that the un-registration process
has succeeded. Click OK to close the dialog box.

Impact of Workaround: The Windows Picture and Fax Viewer will no longer be started when users click on a link to an image type that is associated with the Windows Picture and Fax Viewer.

To undo this change, re-register Shimgvw.dll by following the above steps.

Replace the text in Step 1 with “regsvr32 %windir%\system32\shimgvw.dll” (without the quotation marks).
END

Another option is to turn off images. This is definitely possible in firefox, though we're not sure about Internet Explorer.

More info

 http://news.zdnet.com/2100-1009_22-6016747.html?tag=st.num

 http://www.f-secure.com/zero-day/

dmish (an IMC admin)


Official Microsoft Patch now available

13.01.2006 12:51

The patch, MS06-001, is available here.

 http://www.microsoft.com/technet/security/Bulletin/MS06-001.mspx

dmish


Comments

Hide the following 10 comments

Confirmed danger

04.01.2006 15:43

I don't use windows myself on my own machine but I am at my parents house using their windows xp machine and am concerned. I installed firefox to replacwe explorer but that doesn't protect against this new exploit, ALL BROWSERS AND EMAIL PACKAGES ARE EQUALLY VUNERABLE TO THIS ATTACK.

Could somebody confirm that actual infected images have been found on indymedia at this stage?

Best thing is to stay offline until the microsoftware patch is available which won't be till late next week according to the microsoft website.

"Trojans attack unpatched Microsoft vulnerability

Exploit code is appearing for an unpatched vulnerability in Microsoft's Windows operating system, but users will have to wait another eight days before their computers will be safe. The problem lies in the system for handling Windows Meta Files (WMF) and was discovered on 27 December. Exploit code started to appear shortly afterwards.

"Microsoft is aware of the public release of detailed exploit code that could allow an attacker to execute arbitrary code in the security context of the logged-on user, when such user is visiting a website which contains a specially crafted WMF image," said the company in a statement.

The statement added that Microsoft engineers devised a patch within days of the discovery and will be releasing it on 10 January as part of the company's regular patch releases. The software giant also advised users not to open unsolicited emails and to avoid visiting unknown websites."

Simon


Where are the WMF files you are warning about?

04.01.2006 15:47

We have been aware of this problem for several days... but as far as we are aware there haven't been any images uploaded to this site that contain WMF Trojans -- if you have found some please point them out so we can delete them...

Of course what is needed is a server-side check for uploaded files containing malcious code... perhaps this will get implemented someday...

IMC Techie


report infected images to admin

04.01.2006 15:55

Indymedia users should report infect images to admin.

Any indymedia reports older than a a couple of weeks old should be safe unless they contain comments.

Any new indymedia reports with images should be avoiding (non windows users are completely safe)

Any indymedia reports with comments or addtions should be avoided as these might contain images and are not flaged as containing images so you can't tell until it is too late.

Be careful out there.

iffected


calm down...

04.01.2006 16:36

In fact, Tom Espiner did write an article in ZDnet UK on January 3:
 http://news.zdnet.co.uk/internet/security/0,39020375,39245555,00.htm

The second part of the posting above is a partial cut and paste from this article. The paragraph about instructing windows users to not download mails was included by the poster for added drama, it seems.

Indymedia is not more and not less affected than any other website. The WMF vulnerability hits your computer when downloading JPEG, GIF, or Bitmap files from emails or instant messages. These files can also be embedded within a Web page.


g.rep


Open to abuse

04.01.2006 16:49

Indymedia and similar sites ARE more vunerable to this exploit since anyone can upload imgaes.

It's as simple as that.

curl


Or...

04.01.2006 18:01

Just open the image on a Mac or Linux machine, until the threat is past.

Me.


Windows Exploit fix links

04.01.2006 20:01

For those MS Windows users out there:

Unofficial Fix from:
 http://www.hexblog.com/

Official Fix will be found via:

 http://windowsupdate.microsoft.com/

worth checking out anyway if you have not before.

Also see:

 http://castlecops.com/f212-hexblog.html

 http://www.microsoft.com/technet/security/advisory/912840.mspx

 http://news.bbc.co.uk/1/hi/technology/4580852.stm


Also to see if anything taken advantage already:

Check for malware with adaware:
 http://www.lavasoft.de/software/adaware/

Virus checker:
 http://www.clamwin.com/
but that one only detect on scans and not live detect like:
 http://free-av.com/

Although Gov't/Corp sponsored one site that I think it may be worth many a internet user looking over is:
 http://www.getsafeonline.org/

bunny
- Homepage: http://j12.org/sb/internet.htm


Ditch windows, there is always a threat

04.01.2006 20:07

Be secure , ditch windows.

Run a live linux distro like Knoppix

nix
- Homepage: http://www.knoppix.org


Also check...

05.01.2006 16:47

 http://grc.com are also mirroring the 'un-official' patch as the original site's servers have een struggling to cope with the demand. There's also some excellent general security information there.

Note to everyone.. there is no patch for older versions windows win95/win98/winME, only win2K and above.. if you have an older OS it's defin8ly time 2 upgrade!!!

r0g


test

27.01.2006 20:26




.

.