Welcome to www.mintywhite.com! If you're new here, you may want to subscribe to the RSS feed.
Take a tour of www.Mintywhite.com
Thanks for visiting!
Hackers are trying to exploit a critical Windows vulnerability just patched on Tuesday, security researchers said this afternoon — and the only version of Windows not at risk is the unfinished Windows XP Service Pack 3 (SP3). Fortunately, attackers’ incompetence means that these initial sorties have been unsuccessful, Symantec Corp. said in a brief warning to customers of its DeepSight threat service. “The DeepSight honeynet has observed in-the-wild exploit attempts targeting a GDI vulnerability patched by Microsoft on April 8, 2008,” said Symantec in its alert.
On Tuesday, Microsoft Corp. patched two bugs, both pegged as “critical,” in Windows’ GDI, or graphics device interface, one of the core components of the operating system. According to Microsoft, every current version of Windows, including the very newest, Vista SP1 and Server 2008, is open to attack.
The vulnerabilities can be triggered by malformed WMF (Windows Metafile) or EMF (Enhanced Metafile) image files, Microsoft noted in its accompanying advisory.
Analysts on Tuesday fingered the GDI bugs as the most dangerous of the 10 disclosed and patched by Microsoft that day. They noted similarities between the two new vulnerabilities and others revealed in late 2005, which were extensively exploited by attackers for months afterward.
Amol Sarwate, manager of Qualys Inc.’s vulnerability research lab, said at the time that he expected attackers to quickly begin leveraging the bug. “Users who simply view an image online or in e-mail could be compromised,” he said.
Today, Symantec said it had spotted three different Web sites hosting malicious WMF/EMF image files that were targeting one of the two GDI bugs. However, those images weren’t able to exploit the flaw. “Analysis of the images has shown that although [they] appear to be malicious, they do not contain enough data in the associated image property to sufficiently trigger the vulnerability,” read Symantec’s warning. “We are still investigating the issue as to why this may be the case.”
The security company urged users to immediately apply the GDI patches if they have not done so already. “These attack attempts highlight the severity of this issue, and it is only a matter of time before new images that successfully trigger the issue are observed in the wild,” Symantec concluded.
Ironically, the only version of Windows not vulnerable to attack is Windows XP SP3, the still-not-released final update to the aged operating system. Hidden in the MS08-021 security bulletin was the sentence: “Windows XP Service Pack 3 is not affected by this vulnerability.”
Windows XP SP3’s release date remains a mystery. Although Microsoft has not budged from its “first half of 2008″ public statements, others have speculated that the service pack will wrap up later this month. One Web site, which correctly predicted release dates for Vista SP1, has pegged XP SP3’s rollout as coming in the second half of April.
Microsoft’s GDI patches can be downloaded and installed via the Microsoft Update and Windows Update services, as well as through Windows Server Update Services.
April 11th, 2008 at 4:27 pm
[...] Gonzaga Basketball :: spokesmanreview.com wrote an interesting post today on Attacks begin against critical Patch Tuesday bugHere’s a quick excerptToday, Symantec said it had spotted three different Web sites hosting malicious WMF/EMF image files that were targeting one of the two GDI… [...]