There is a new JPG vulnerability that can allow arbitrary code to be
run on your computer.
More details are found at this link:
http://www.wired.com/news/infostructure/0,1377,64959,00.html?tw=wn_tophead_6
and here:
http://www.microsoft.com/security
Keith -- Easynews Support
>It never ends, does it?
Doesn't seem to, but at least MS is getting faster at fixing
things....hopefully.
- mark -
So don't go loading those random >2GB images you see posted
like spam!
Keith -- Easynews Support
http://forum.easynews.com
It is possible to "malform" a jpeg so that arbitrary code can be executed on Windows
machines that use GDI to load and view images. From what I can gather, most likely
the GDI library call that loads JPEG images has a buffer overflow. Since many
windows applications use the the GDI library to convert JPEG, bitmap and other image
formats into DIB (device independant bitamps) this bug is likely to be very easily
exploited. Because so many JPEGs are posted to Usenet, and because simply attempting
to view the image can cause your machine to become compromised, we highly recommend
that you patch immediately.
Images sent via e-mail could also trigger the bug, so I expect a new worm will be
created to exploit this vulnerability fairly quickly.
--
This .sig file has been removed to make room for other .sig files.
I strongly disagree, and Microsoft doesn't release "critical" updates for nothing.
Since Windows Explorer (which is just one component of XP that is vulnerable,
others include Paint, Picture Viewer, and Wordpad) is vulnerable to the bug, along
with any other apps that use GDI+ this is a highly exploitable and very dangerous
vulnerability.
Directly from the Wired article:
"The one thing that makes this a bit different is that it affects so many
applications," said Craig Schmugar, a virus research manager at McAfee. "Home users
should definitely roll this (patch) out as soon as possible."
..
and from the MS bulletin:
This issue affects software that supports this image format, including some
versions of Microsoft Windows, Microsoft Office, and Microsoft developer tools. If
you have any of the listed software installed on your computer, you should install
the related update.
..
Any applications that load JPEG images using GDI+ library calls are most likely
vulnerable. Applications that use custom code to load JPEG images are most likely
not vulnerable.
FWIW, from
http://www.microsoft.com/security/bulletins/200409_jpeg.mspx
"Important Windows XP Service Pack 2 (SP2) is not affected by this issue.
Windows XP SP2 users only need to update Office (if installed)."
Which begs the question, why did this thing appear on the critical update
list for SP2? Have I installed some kind of vulnerability checker, and if
so, how do I access it again, say, after installing some software which
may have re-opened the vulnerability? Would I need to?
--
Stuart
Another good reason to switch to Linux.
:-)
Uni
Actually, I occasionally get paid to take surveys via a third party survey company and
they very recently had just such a survey from Microsoft.
It wasn't as direct as that, but that was basically the type of questions they were
asking.
The related download for XP SP2 is a checker for vulnerable apps. Some apps improperly included
their own version of gdiplus.dll instead of using the one included with Windows. The older versions
of the dll included with those apps needs to be replaced with the newer version, otherwise those apps
will still be vulnerable to the bug.
If you have any apps that need upgraded, the update checker will take you to the updates page.
Thats a bogus reason to switch to Linux as far as I am concerned. Open source
software doesn't in general have less vulnerabilities than closed source software.
The vulnerabilities tend to get noticed quicker (in some cases) than others and
sometimes fixed faster, but users have just as hard a time, if not harder,
upgrading packages and keeping their Linux machines secure as Windows users.
The question is, what happens /after/ I've run the update checker, and
then install such a vulnerable app? Will it be blocked, automatically
upgraded, or will I need to run the update checker again? If so, how?
Not that this will be a problem for me, but it is sure to be for someone.
--
Stuart
> http://www.microsoft.com/security/bulletins/200409_jpeg.mspx
Went to that page in Mozilla, guess what: the button to check for
vulnerabilities doesn't work. I needed to start up IE to get that page to
work.
--
--
Bart Van Hemelen
--------------------------------------------------------------------------
lots of useful information (downloading from usenet, EasyNews features,...)
here:
http://users.pandora.be/bvh2000/useful.html
--------------------------------------------------------------------------
The real question is: does anyone even need a reason to switch to a
different OS? At this point, my answer would be no.
---
Blair
EasyNews Support
S', at one time I respected Microsoft. However, they are so slow at
dealing with security issues, these days. If you use Microsoft software,
you're a sitting duck for trouble. Heck, even one of your colleagues
mentioned something about vulnerability with .JPG files and Microsoft
software.
After I reading this site, you'll understand why:
http://www.hevanet.com/peace/microsoft.htm
Best regards,
Uni
Microsoft ensures that the only browser that will work with their site
is Internet Explorer (AKA The Sitting Duck of Adware/Spyware). Microsoft
wants so badly to take over the internet.
Uni
More like a black cloud over you, if you use Microsoft software.
:-)
Uni
>