Exploitation also successfully occurs on Windows 2000, with testing carried out on 2000/SP4 with all the latest patches. Image viewers like Irfanview and XnView rely on the vulnerable file to show. wmf files installed, there’s a high chance that the system will be vulnerable. If the Windows 2000 system has an image viewer which supports. Our testing has also revealed that although Windows 2000 is not vulnerable by default, it is potentially vulnerable. The attackers seem very well aware of this fact and have already released malware which will be downloaded and executed in a directory where a limited user has execution rights. In this case, nothing could be much further from the truth. This may make people feel that they are protected from malware. Some people run under a limited user account (which among other things restricts NTFS rights). Perhaps the most worrying thing about this whole issue is that NTFS rights have no effect on whether or not the vulnerability will be exploited. This shows that although HW DEP can help, it’s by no means a solution. This is because both Irfanview and XnView are packed with ASPack and Windows disables HW DEP for ASPack packed files. However, when testing the latest builds of third party image viewers like Irfanview and XnView HW DEP didn’t prevent exploitation, even with HW DEP enabled for all programs. We’ve tested on AMD and Intel platforms and HW DEP seemed initially to prevent successful exploitation in Internet Explorer and Windows Explorer. Naturally we’ve been doing some research on this vulnerability and we’ve come up with some interesting findings.Īt first glance it seems that hardware-based Data Execution Protection, which is available only with XP/SP2 on NX-bit (AMD) and XD-bit (Intel) enabled CPUs, prevents successful exploitation of the vulnerability. In addition to this, the sites are distributing so called ‘anti-spyware applications’ (which require the infected user to pay) and other malware, such as, which isn’t directly related to these applications. wmf files.ĭozens of sites are already hosting malicious. As I’m sure you’ve heard by now, attackers are taking advantage of an unpatched vulnerability which gets exploited by.
0 Comments
Leave a Reply. |