Forum Moderators: open
[microsoft.com...]
Affects:
Windows XP
Windows XP Service Pack 1 (SP1)
Windows Server 2003
Internet Explorer 6 SP1
Office XP SP3
Note Office XP SP3 includes Word 2002, Excel 2002, Outlook 2002, PowerPoint 2002, FrontPage 2002, and Publisher 2002.
Office 2003
Note Office 2003 includes Word 2003, Excel 2003, Outlook 2003, PowerPoint 2003, FrontPage 2003, Publisher 2003, InfoPath 2003, and OneNote 2003.
Digital Image Pro 7.0
Digital Image Pro 9
Digital Image Suite 9
Greetings 2002
Picture It! 2002 (all versions)
Picture It! 7.0 (all versions)
Picture It! 9 (all versions, including Picture It! Library)
Producer for PowerPoint (all versions)
Project 2002 SP1 (all versions)
Project 2003 (all versions)
Visio 2002 SP2 (all versions)
Visio 2003 (all versions)
Visual Studio .NET 2002
Note Visual Studio .NET 2002 includes Visual Basic .NET Standard 2002, Visual C# .NET Standard 2002, and Visual C++ .NET Standard 2002.
Visual Studio .NET 2003
Note Visual Studio .NET 2003 includes Visual Basic .NET Standard 2003, Visual C# .NET Standard 2003, Visual C++ .NET Standard 2003, and Visual J# .NET Standard 2003.
.NET Framework 1.0 SP2
.NET Framework 1.0 SDK SP2
.NET Framework 1.1
Platform SDK Redistributable: GDI+
[news.bbc.co.uk...]
I'm confused. Does this mean that ordinary jpegs on websites can pose security risks.
Yes, but then all untrusted data pose security risks
If so, how does it happen? (or, what could happen?)
A specially corrupted JPEG tricks the program in to interpreting part of the JPEG as executable code. The OS treats that code as part of the exploited application, so it has the same priviledges. If you're logged in as Administrator, the exploit code now has admin rights to your PC.
For the techncally inclined, search for "smashing the stack for fun and profit", a classic article from Phrack on this type of exploit.
[secunia.com...]
Why the h*ll would a graphics editor execute code?
I haven't seen it being called a buffer overload, so it is probably doing something other than overlaying the executable code already in place.
stand corrected. It is all microsoft apps. Hmm, I wonder what these apps do to execute data?
The way that it works is that a person with malicious intent creates a special JPEG (let's call him Bart). This JPEG uses bugs inside the Microsoft dynamic link library to overflow a buffer. By taking advantage of this bug, Bart, can have code that he places into the JPEG execute. Since that code is running as you, it has whatever privileges you have and can do whatever you could do to the machine.
Only programs that use the dynamic link library to process the JPEG are vulnerable. However, virtually all of Microsoft's programs use this dynamic link library, so they are all vulnerable. Until you upgrade the dynamic link library on your machine, you are at severe risk.
Just viewing the malicious JPEG in IE will be enough that your machine will be compromised. Or in Outlook, or a variety of other programs.
It is critical that you patch every machine on your network, using both Windows Update and Office Update, as well as updating any other programs that use the DLL.
See these web sites for more information and locations to download patches: [microsoft.com...] and [microsoft.com...]
Knowing a file pattern to look for, I'm thinking that I can use PHP (which handles the file uploading) to scan the files for it making sure it is clean.
Thanks,
Dwayne (who once again, without starting a flame fest, is glad he has a Mac).
In the case of a site where visitors are allowed to upload images, is there some way to ensure the jpegs being uploaded are carrying a nasty payload?
Sure is...the AV program that server is running.
I work with Symantec here and there. Even though there is no real world code in existance....YET, they are catching this as Bloodhound.Exploit.13 via the hueristics scan.
Take care,
Brian
In the case of a site where visitors are allowed to upload images, is there some way to ensure the jpegs being uploaded are carrying a nasty payload?Sure is...the AV program that server is running.
I work with Symantec here and there. Even though there is no real world code in existance....YET, they are catching this as Bloodhound.Exploit.13 via the hueristics scan.
Perhaps this is where I am confused. On an ISP's LAMP architecture (Linux, Apache, MySQL & PHP) I have found no reference to virus scanning, as well, it is a Web server, not an e-mail server. Perhaps I am missing something, but my overall impression is that there is no reason to have virus scanning on a pure web server?
I think I see your point if the server is running e-mail and other services, but for a user-uploaded file, I am missing the link here.
If I am just totally out to lunch, let me know. Thanks, Dwayne
Perhaps I am missing something, but my overall impression is that there is no reason to have virus scanning on a pure web server?
Guess I just assumed when users are allowed to upload from the wild that a scan would happen on that stream. My mistake. You guessed right I mainly do e-mail adminstration at the server level and AV. However the web farm, at our org., is not under my AV duties.
Take care,
Brian
Perhaps I am missing something, but my overall impression is that there is no reason to have virus scanning on a pure web server?Guess I just assumed when users are allowed to upload from the wild that a scan would happen on that stream. My mistake. You guessed right I mainly do e-mail adminstration at the server level and AV. However the web farm, at our org., is not under my AV duties.
You're right about checking files uploaded from the wild, but, the checking now is done to ensure that it is a valid jpeg file (header check) and then, to be sure, there is some re-sizing done, so if it is not a jpeg, then well, the code returns a fail on the upload and it is never posted as a graphic.
In this new vulnerability, it is my impression that this virus is part of a valid jpeg, which is where my original query about the pattern matching comes in (which is what virus software does anyway right?). Just in this case, there is no AV software running on the web server, just the upload manager that ensures the files are valid jpegs.
Also, anyone know of a code chunk that can be scanned for to see if a jpeg contains this virus?
Thanks again for comments,
Dwayne
Regards,
R.