BugTraq
RE: WMF Exploit Dec 28 2005 11:01PM
Hayes, Bill (Bill Hayes owh com) (1 replies)
CERT now has posted Vulnerability Note VU#181038, "Microsoft Windows may
be vulnerable to buffer overflow via specially crafted WMF file"
(http://www.kb.cert.org/vuls/id/181038). The note provides additional
details about the exploit and its effects. Very few workarounds have
been proposed other than blocking at the perimeter and possibly
remapping the .wmf extension to some application other than the
vulnerable Windows Picture and Fax Viewer (SHIMGVU.DLL).

Bill...

-----Original Message-----
From: davidribyrne (at) yahoo (dot) com [email concealed] [mailto:davidribyrne (at) yahoo (dot) com [email concealed]]
Sent: Wednesday, December 28, 2005 4:18 PM
To: bugtraq (at) securityfocus (dot) com [email concealed]
Subject: WMF Exploit

Another quick observation, again, I apologize if this information has
already been posted; I haven't been able to read all the posts today.
The thumbnail view in Windows Explorer will parse the graphics files in
a folder, even if the file is never explicitly opened. This is enough to
trigger the exploit. Even more frightening is that you don't have to use
the thumbnail view for a thumbnail to be generated. Under some
circumstances, just single-clicking on the file will cause it to be
parsed.

David Byrne

[ reply ]
RE: WMF Exploit Dec 29 2005 09:34PM
Bill Busby (williambusby2001 yahoo com) (1 replies)
Re: WMF Exploit Dec 30 2005 08:40PM
Paul Laudanski (zx castlecops com) (3 replies)
Re: WMF Exploit Jan 01 2006 08:31PM
Justin Myers (masterbofh gmail com)
RE: WMF Exploit Dec 31 2005 08:03PM
Paul (pvnick gmail com)
Re: WMF Exploit Dec 30 2005 10:45PM
Frank Knobbe (frank knobbe us)


 

Privacy Statement
Copyright 2010, SecurityFocus