[WinPartners] unpatched Windows exploit (WMF)
Tim McGovern
tjm at MIT.EDU
Tue Jan 3 16:12:16 EST 2006
Paul,
In response to your question, let me review some of the facts that we
have in this evolving situation, some of which you probably already
know.
Although there are exploits on the loose, we are not seeing any
infections within the MIT network at this time. We are monitoring
the situation.
The primary attack vectors are the Picture and FAX viewer in
conjunction with malware infected websites. Aggregating protection
through updated anti-virus software, disabling the viewer and
practicing safe email habits should buy us all enough time to verify
& deploy the SANS patch or until Microsoft's official patch is released.
However, there are steps we can recommend to everyone that will
reduce one's risk.
1. Make sure you back up your system frequently (daily if possible).
2. Make sure virus definitions on McAfee Enterprise are set to update
daily, and that you are running with the latest definitions. Check to
make sure updates are actually happening by starting the McAfee
console and looking at the timestamp on the definitions update.
3. Make sure your machine is set up to auto-download and auto-install
critical updates, either via MIT's WAUS service or normal Windows
Update. It should be configured to check for updates daily. Microsoft
is throwing significant resources at having a patch soon, and you
want the window between patch availability and download to be as
small as possible.
4. Be extra cautious about opening pictures or HTML documents you
receive in email until a patch is available.
5. If your email client supports it, turn off automatic loading of
HTML content and automatic display of pictures.
6. If you already have an alternate web browser installed (such as a
current version of Firefox) which does not automatically display WMF
format images, use it at least until a patch is available. If using
such a browser, do not download and open image files unless you are
sure of what they are.
7. Don't click on URL's you receive in email directly. If you receive
mail with a web link, type the link or site into your web browser
manually. At a minimum, if it is personal email from someone you know
asking you to look at a site, cut-and-past the URL from the email
into a web browser, and read it to see it makes sense before hitting
return or "Go" or whatever. If it is email from a company, manually
type in the company's web site and navigate to where they want you to
go.
Not only does this keep you from jumping to a web set that will load
a WMF file (one way exploits for this beast can spread), but it is
also generally useful in preventing phishing attacks.
Microsoft is currently working hard on a patch (according to our
contacts) and throwing significant resources at the problem. As you
know, the internal version has been completed, and we are working on
getting the pre-release version of the patch for testing, possibly as
early as today. Microsoft's latest bulletin indicates a date of
January 10th for release of an official patch.
See: http://www.microsoft.com/technet/security/advisory/
912840.mspx.
Others are working hard on evaluating a third-party patch that's been
verified and announced by the SANS organization.
Note: we are not yet ready to recommend this patch.
Our concern is that installing the SANS patch may cause problems down
the road with official MS patches and updates, leaving the system
vulnerable in the future.
We do expect to deploy a patch from Microsoft via MIT's WAUS service
when Microsoft releases a patch to the general public, or before.
-- Tim
==============================
Tim McGovern
Manager, I/T Security Support
Client Support Services
Information Services & Technology
Massachusetts Institute of Technology
77 Massachusetts Ave. Room N42-040k
Cambridge MA 02139-4307
(617) 253-0505
More information about the winpartners
mailing list