Categories: PCSecurityWorkspace

Windows Graphics Vulnerability Warning Issued

Exploit code for a new Windows security bug has gone public, prompting Microsoft today to issue an advisory to warn users.

So far, no attacks taking advantage of the bug have been seen in the wild, Microsoft reported. The vulnerability lies in the Windows Graphic Rendering Engine, and according to Microsoft, can be used by an attacker to run arbitrary code in the context of the logged-on user.

Older Windows Versions Affected

“Today we released Security Advisory 2490606, which addresses a publicly disclosed vulnerability affecting Microsoft Windows Graphics Rendering Engine on Vista, Server 2003, and Windows XP… The vulnerability does not affect Windows 7 or Windows Server 2008 R2, the newest versions of our operating system,” blogged Angela Gunn, senior marketing communications manager of Trustworthy Computing at Microsoft.

“To target this vulnerability, an attacker must convince a user to visit a specially crafted malicious Web page, or to open a malicious Word or PowerPoint file,” Gunn added. “Furthermore, users whose accounts are configured to have fewer user rights on the system would be less affected by an attack then those running with administrative rights. The Advisory includes further mitigations and workarounds to protect our customers.”

According to H D Moore, chief security officer at Rapid7, the bug was first presented at a Korean security conference last month. Exploit code for it has been added to Rapid7’s Metasploit Framework, a penetration testing tool.

“The biggest challenge was working around DEP [data execution prevention] and ASLR [addresses space layout randomisation] but the current exploit is reliable on XP SP3 and Windows 2000,” Moore said. “It should be possible to port this to Windows 7 and embed it in a variety of file types (DOC, PPT, etc), but the current version has a somewhat limited use case.”

He explained the attacker must convince the user to browse a directory containing the file in Thumbnails mode and that the exploit relies on a complicated return path using ROP (return-oriented programming) that may not work when a certain multimedia codec is updated.

“Until the exploit is ported to work within OLE containers (DOC/PPT/etc), I don’t think we will see widespread exploitation for the reasons above,” he said.

Jerry Bryant, group manager of response communications for Microsoft, said the issue does not currently rise to the level where it would require an out-of-band patch, but the company is working on a fix. Microsoft’s first Patch Tuesday update of the year is scheduled for January 11.

As a workaround, users can follow the directions in the advisory to modify the access control list on shimgvw.dll.

“The real danger this vulnerability poses is that it can be exploited simply by getting a user to view a malicious thumbnail image associated with a number of different document types, including Microsoft Word,” explained Joshua Talbot, security intelligence manager for Symantec Security Response. “Although a fix for this issue is not currently available, Microsoft has provided a workaround to help mitigate the impact of this vulnerability until it is patched.

“Users of all the affected operating systems – which range from Windows 2000 to Windows Vista to Windows Server 2008 – should use caution when handling untrusted files and avoid following untrusted links,” he warned. “Monitoring networks for unexpected traffic to file shares might also aid in detecting attempted attacks.”

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

Russia Accused Of Cyberattack On Germany’s Ruling Party, Defence Firms

German foreign minister warns Russia will face consequences for “absolutely intolerable” cyberattack on ruling party,…

1 day ago

Alphabet Axes Hundreds Of Staff From ‘Core’ Organisation

Google is reportedly laying off at least 200 staff from its “Core” organisation, including key…

1 day ago

Apple Announces Record Share Buyback, Amid iPhone Sales Decline

Investor appeasement? Apple unveils huge $110 billion share buyback program, as sales of iPhone decline…

1 day ago

Tesla Backs Away From Gigacasting Manufacturing – Report

Tesla retreats from pioneering gigacasting manufacturing process, amid cost cutting and challenges at EV giant

2 days ago

US Urges No AI Control Of Nuclear Weapons

No skynet please. After the US, UK and France pledge human only control of nuclear…

2 days ago