Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Critical Windows Patch Fights Takeover Attacks

    Written by

    Ryan Naraine
    Published November 8, 2005
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Three image-rendering flaws in the Windows operating system could put millions of Internet-connected users at risk of PC takeover attacks, Microsoft Corp. warned on Tuesday.

      The flaws could be exploited via any software that displays images, including the widely used Microsoft Outlook, Microsoft Word and Internet Explorer programs.

      The bugs are considered particularly dangerous because users could be at risk by merely browsing to a malicious rigged site with rigged image files, or by displaying images in the preview pane of an e-mail program.

      Microsoft tagged the update as “critical,” its highest severity, and urges Windows users to download and apply the patches immediately.

      The flaws affect Windows 2000, Windows XP (including Service Pack 2) and Windows Server 2003.

      According to the MS05-053 bulletin, the nastiest of the three is a remote code execution bug in the rendering of WMF (Windows Metafile) and EMF (Enhanced Metafile) image formats.

      “Any program that renders WMF or EMF images on the affected systems could be vulnerable to this attack. An attacker who successfully exploited this vulnerability could take complete control of an affected system,” the company warned.

      The bulletin also addresses two separate unchecked buffers in the way the operating system renders EMF and WMF images.

      Image-rendering vulnerabilities are deemed particularly serious because malicious hackers can simply place a rigged photograph on a Web site and trick users into visiting. By merely browsing to the malicious site, the user allows the attacker to execute harmful code to take complete control of an unpatched machine.

      In the past, image-rendering bugs have been used in widespread attacks. In one case, a hacker broke into an ad server and successfully loaded exploit code on banner advertising served on hundreds of Web sites. European tech publisher The Register was among those affected.

      The latest flaw was discovered by at least three private research teams and reported to Microsoft more than seven months ago.

      eEye Digital Security, one of the research firms credited with finding the vulnerability, reported it to Microsoft on March 29, but a comprehensive fix was delayed for a long time because of the complicated nature of testing such an important update, according to Stephen Toulouse, a program manager in the MSRC (Microsoft Security Response Center).

      “Theres absolutely a good reason [for the delay],” Toulouse said in an interview with Ziff Davis Internet News. “The graphics rendering system is an extremely important component of the operating system. Its critical to functioning of operating system. Any time you make a change to such an important component, you absolutely have to ensure youre not introducing new problems.”

      /zimages/5/28571.gifClick here to read about another exploit that allows malicious code to be triggered when a user views a JPEG.

      Toulouse blamed the long delay on the rigid patch-testing procedures at Microsoft. “We have to ensure that the update is of the highest quality so customers are confident enough to deploy it to protect themselves,” Toulouse said.

      Steve Manzuik, security product manager on the eEye research team, said the idea that a software company needs more than seven months to fix such a dangerous flaw is difficult to comprehend.

      “To us, anything between 60 to 90 days is fair. They [Microsoft] have their own testing system that probably takes longer than that. They claim they need 60 days to do regression testing alone, but that does seem like a very long time,” Manzuik said.

      /zimages/5/28571.gifRead an example here of why Microsoft may want to take its time releasing patches.

      Microsofts Toulouse objected to the idea that theres a deadline that determines whether a company is creating security fixes in a timely manner.

      “In this case, we were making significant changes to the graphics rendering, which is a critical part of the operating system. These are very deep changes that affect multiple files. It becomes a quality issue because you want your customers to trust your updates,” Toulouse said.

      “The update that customers wont deploy because they cant trust it, doesnt protect anyone. This is a very important issue for us.”

      However, eEyes Manzuik argued that its a safe assumption that outside hackers are finding the same vulnerabilities and not reporting them to Microsoft. “Thats something you have to assume. In this case, there were two other companies reporting the same flaw. Whos to say we were the only three who found it?” Manzuik said.

      /zimages/5/28571.gifFor advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internets Security IT Hub.

      Microsoft confirmed that code breakers at Symantec Corp. and Venustech AdDLab also reported the vulnerabilities.

      Dave Cole, director of product management at Symantec Security Response, underscored the urgency attached to Tuesdays bulletin. He said possible attacks could occur through a malicious file on a Web site, an embedded file in a Microsoft Office document, or in an HTML e-mail.

      “The variety of ways to initiate a possible attack makes this issue particularly potent. [We] recommend that users apply the update as quickly as possible and refrain from opening unknown attachments or clicking on suspicious links that arrive via e-mail or instant messages,” Cole added.

      In addition to addressing this vulnerability, Microsoft released the scheduled monthly update of its malicious software removal tool to add detection for several new virus variants, including Win32/Bugbear, Win32/Opaserv, Win32/Mabutu, Win32/Swen and Win32/Codbot.

      /zimages/5/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Ryan Naraine
      Ryan Naraine

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.