Exploit code for a new Windows security bug has gone public, prompting Microsoft today to issue an advisory to warn users.
So far, no attacks taking advantage of the bug have been seen in the wild, Microsoft reported. The vulnerability lies in the Windows Graphic Rendering Engine, and according to Microsoft, can be used by an attacker to run arbitrary code in the context of the logged-on user.
“To target this vulnerability, an attacker must convince a user to visit a specially crafted malicious Web page, or to open a malicious Word or PowerPoint file,” Gunn added. “Furthermore, users whose accounts are configured to have fewer user rights on the system would be less affected by an attack then those running with administrative rights. The Advisory includes further mitigations and workarounds to protect our customers.”
According to H D Moore, chief security officer at Rapid7, the bug was first presented at a Korean security conference last month. Exploit code for it has been added to Rapid7’s Metasploit Framework, a penetration testing tool.
“The biggest challenge was working around DEP [data execution prevention] and ASLR [addresses space layout randomisation] but the current exploit is reliable on XP SP3 and Windows 2000,” Moore said. “It should be possible to port this to Windows 7 and embed it in a variety of file types (DOC, PPT, etc), but the current version has a somewhat limited use case.”
He explained the attacker must convince the user to browse a directory containing the file in Thumbnails mode and that the exploit relies on a complicated return path using ROP (return-oriented programming) that may not work when a certain multimedia codec is updated.
“Until the exploit is ported to work within OLE containers (DOC/PPT/etc), I don’t think we will see widespread exploitation for the reasons above,” he said.
Jerry Bryant, group manager of response communications for Microsoft, said the issue does not currently rise to the level where it would require an out-of-band patch, but the company is working on a fix. Microsoft’s first Patch Tuesday update of the year is scheduled for January 11.
As a workaround, users can follow the directions in the advisory to modify the access control list on shimgvw.dll.
“The real danger this vulnerability poses is that it can be exploited simply by getting a user to view a malicious thumbnail image associated with a number of different document types, including Microsoft Word,” explained Joshua Talbot, security intelligence manager for Symantec Security Response. “Although a fix for this issue is not currently available, Microsoft has provided a workaround to help mitigate the impact of this vulnerability until it is patched.
“Users of all the affected operating systems – which range from Windows 2000 to Windows Vista to Windows Server 2008 – should use caution when handling untrusted files and avoid following untrusted links,” he warned. “Monitoring networks for unexpected traffic to file shares might also aid in detecting attempted attacks.”
Fourth quarter results beat Wall Street expectations, as overall sales rise 6 percent, but EU…
Hate speech non-profit that defeated Elon Musk's lawsuit, warns X's Community Notes is failing to…
Good luck. Russia demands Google pay a fine worth more than the world's total GDP,…
Google Cloud signs up Spotify, Paramount Global as early customers of its first ARM-based cloud…
Facebook parent Meta warns of 'significant acceleration' in expenditures on AI infrastructure as revenue, profits…
Microsoft says Azure cloud revenues up 33 percent for September quarter as capital expenditures surge…