Wednesday, August 20, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Ballmer Steps Down From Microsoft Board
Samsung To Unveil New Smart TV Content at IFA 2014
LG's Flowing Sound Audio Wireless Solution Coming At IFA
ASUS To Unveil Smartwatch At IFA
WD Releases Anniversary Edition My Passport Drives
JPR Reports AMD, Intel Jump in GPU Shipments, Nvidia Slips
HTC One M8 for Windows Unveiled
SanDisk Releases The TLC-based Ultra II SSD
Active Discussions
help questions structure DVDR
Made video, won't play back easily
Questions durability monitor LCD
Questions fungus CD/DVD Media, Some expert engineer in optical media can help me?
CD, DVD and Blu-ray burning for Android in development
IBM supercharges Power servers with graphics chips
Werner Vogels: four cloud computing trends for 2014
Video editing software.
 Home > News > General Computing > Exploit...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, September 23, 2004
Exploit posted for Microsoft JPEG flaw


Computer code that takes advantage of a flaw in the way many Microsoft applications process JPEG images has been published on the Internet and could be a precursor to actual attacks on vulnerable PCs, experts said.

The code was published late last week, only days after Microsoft revealed the "critical" vulnerability and made available patches to fix the problem. Any application that processes JPEG images could be vulnerable. A wide range of Microsoft software, including versions of its Windows and Office products, are vulnerable.

So far only "proof-of-concept" code has been published, which can cause a vulnerable Web browser to crash or a PC to freeze. A fully developed exploit would allow an attacker to take control of a victim's computer by remotely opening a command prompt or downloading and running malicious software, one expert.

"Typically a proof of concept is a first step towards a full blown exploit," said Johannes Ullrich, chief technology officer at The SANS Institute's Internet Storm Center. "It is an indication that people are playing with it and experimenting to try and get it to work for other purposes, typically to open a remote shell or download and execute code."

Microsoft is aware of the exploit code and is investigating the matter, a company spokeswoman said. "Microsoft?s early investigation of this code indicates that it can cause a computer that does not have (the patches) installed to stop responding, but it does not execute code remotely," she said.

Microsoft urges all customers to immediately install the software updates it made available with Security Bulletin MS04-028. Customers who are still testing the patches should implement the workaround steps outlined in the bulletin, Microsoft said.

The pattern to exploitation of the JPEG vulnerability is not much different than with other vulnerabilities, according to the SANS Institute's Internet Storm Center. Typically proof-of-concept code is published a few days after details of the flaw are released followed by a hunt to fully exploit the flaw. A worm or mass mailer is likely to surface by the end of the month, according to the organization's Web site.

While the race is on to create malicious code and there seems to be a real possibility for large scale exploitation of the JPEG processing weakness, Ullrich has some hope that it won't be.

"One thing that makes me think that this may not be this big is that these image format vulnerabilities, there are literally dozens of them, and for whatever reason they have not been widely exploited in the past," he said.

To take advantage of the flaw, an attacker would have to persuade a user to open a specially crafted image file. The image could be hosted on a Web site, included in an e-mail or Office document or hosted on a local network, Microsoft said last week.

The vendor rates the flaw "important' for many of its products, but "critical" for Outlook versions 2002 and 2003, Internet Explorer 6 with Service Pack 1, Windows XP and Windows XP with Service Pack 1, Windows Server 2003, and the .Net Framework 1.0 with Service Pack 2 and .Net Framework 1.1.

In Microsoft's rating system for security issues, vulnerabilities that could allow a malicious Internet worm to spread without any action required on the part of the user are rated critical. Issues that do require a user action to spread a worm, but could still expose user data or threaten system resources, are rated important.

More information on the JPEG flaw is available at: http://www.microsoft.com/technet/security/bulletin/ms04-028.mspx

From DIGIT



Previous
Next
Fujifilm FinePix S3 Pro: the digital SLR that's tuned for image quality        All News        Acer to sell Foxconn and BenQ shares
Google to fight Microsoft with own browser?     General Computing News      Acer to sell Foxconn and BenQ shares

Source Link Get RSS feed Easy Print E-Mail this Message

Related News
Samsung, Microsoft Want To End Android Patent Dispute Soon
Sony, Huawei, Microsoft To Announce New Smartphones at 2014 IFA
Microsoft Releases 19-euro Music Phone
Microsoft Sues Samsung Over Royalty Payments
Microsoft Releases New Limited Edition Wireless Mobile Mouse 3500 With Master Chief from Halo
Microsoft Details Windows Phone 8.1 Update, Brings Cortana To New Markets
Microsoft Releases The Sharks Cove, A Raspberry Pi Alternative
China Starts Anti-monopoly Investigation On Microsoft
Microsoft's Profit Hurt By Nokia Acquisition, Plans Unified OS
Microsoft Is Shutting Down Xbox Entertainment Studios
Microsoft To Eliminate 18,000 Jobs
Microsoft To Take EU 'Right to be forgotten' Requests

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .