AGL 40.21 Increased By ▲ 0.18 (0.45%)
AIRLINK 127.64 Decreased By ▼ -0.06 (-0.05%)
BOP 6.67 Increased By ▲ 0.06 (0.91%)
CNERGY 4.45 Decreased By ▼ -0.15 (-3.26%)
DCL 8.73 Decreased By ▼ -0.06 (-0.68%)
DFML 41.16 Decreased By ▼ -0.42 (-1.01%)
DGKC 86.11 Increased By ▲ 0.32 (0.37%)
FCCL 32.56 Increased By ▲ 0.07 (0.22%)
FFBL 64.38 Increased By ▲ 0.35 (0.55%)
FFL 11.61 Increased By ▲ 1.06 (10.05%)
HUBC 112.46 Increased By ▲ 1.69 (1.53%)
HUMNL 14.81 Decreased By ▼ -0.26 (-1.73%)
KEL 5.04 Increased By ▲ 0.16 (3.28%)
KOSM 7.36 Decreased By ▼ -0.09 (-1.21%)
MLCF 40.33 Decreased By ▼ -0.19 (-0.47%)
NBP 61.08 Increased By ▲ 0.03 (0.05%)
OGDC 194.18 Decreased By ▼ -0.69 (-0.35%)
PAEL 26.91 Decreased By ▼ -0.60 (-2.18%)
PIBTL 7.28 Decreased By ▼ -0.53 (-6.79%)
PPL 152.68 Increased By ▲ 0.15 (0.1%)
PRL 26.22 Decreased By ▼ -0.36 (-1.35%)
PTC 16.14 Decreased By ▼ -0.12 (-0.74%)
SEARL 85.70 Increased By ▲ 1.56 (1.85%)
TELE 7.67 Decreased By ▼ -0.29 (-3.64%)
TOMCL 36.47 Decreased By ▼ -0.13 (-0.36%)
TPLP 8.79 Increased By ▲ 0.13 (1.5%)
TREET 16.84 Decreased By ▼ -0.82 (-4.64%)
TRG 62.74 Increased By ▲ 4.12 (7.03%)
UNITY 28.20 Increased By ▲ 1.34 (4.99%)
WTL 1.34 Decreased By ▼ -0.04 (-2.9%)
BR100 10,086 Increased By 85.5 (0.85%)
BR30 31,170 Increased By 168.1 (0.54%)
KSE100 94,764 Increased By 571.8 (0.61%)
KSE30 29,410 Increased By 209 (0.72%)

A vulnerability has been discovered in Microsoft Windows that allows hackers to remotely access PCs and install malware through an imaging-handling technology in the operating system.
Microsoft acknowledged the release of exploit code that could allow an attacker to execute arbitrary code when someone visits a Web site that contains a specially crafted Windows Metafile (WMF) image. Security authority Secunia labelled the vulnerability "extremely critical."
WMF images are graphical files that can contain both vector and bitmap-based picture information. Microsoft Windows contains routines for displaying such files, but a lack of input validation in one of these routines may allow a buffer overflow to occur, which in turn may allow remote code execution.
The vulnerability can also be triggered from the Internet Explorer (IE) browser if the malicious file has been saved to a folder and renamed to other image file extensions such as .jpg, .gif, .tif, and .png. It has been detected on a patched system running Microsoft Windows XP SP2. Microsoft Windows XP SP1 and Microsoft Windows Server 2003 systems also are affected.
Current exploits use the Windows Picture and Fax Viewer to attack any application that can handle Windows Metafiles. Disabling the Windows Picture and Fax Viewer will not eliminate the risk as the flaw exists in the Windows Graphical Device Interface library.
The flaw has also raised concerns that Google Desktop may be another potential attack vector, and that various anti-virus software products cannot detect all known exploits for this vulnerability.
By default, Explorer on those operating systems runs in a restricted mode known as Enhanced Security Configuration, which Microsoft said mitigates this vulnerability as far as e-mail is concerned, although clicking on a link in a message would still put users at risk.
Yankee Group senior analyst Andrew Jaquith characterised the vulnerability as a serious security issue that has cropped up before in browsers, including Firefox and Safari. "It's particularly nasty because the browser automatically loads images when users visit a Web site. There is no built-in protection," he said.
Jaquith predicted that additional exploits of the vulnerability are expected since there is no patch available and the security hole is difficult to plug. People who use Windows are advised to be wary when opening e-mail and links in e-mail from sources they don't trust. They should not save, open or preview image files from unfamiliar sources. And, as always, people are encouraged to update the patches for their operating systems.

Copyright Business Recorder, 2006

Comments

Comments are closed.