Mods - you may want to sticky this as forums are particularly in danger.
stolen from another forum I frequent:
-----------
UPDATE: Unofficial word from Microsoft is that the patch is DONE but it will be out January 10 as part of their regular schedule. They are testing it and localizing it for languages. Keep your Antivirus up to date and continue to follow the updated threat mitigation procedures below. If you are worried about new variations coming out faster than your Antivirus updates, see bullet point #9 for some temporary patches- both of which appear to remove the vulnerability.
WHAT IS IT?
There is a new exploit (with several variations) out that uses WMF (windows metafile format) files to infect a computer. The problem is in a file called GDI32.DLL, a part of Microsoft Windows that extracts information from WMF files. When a WMF file is created in a certain way, it can execute commands on the computer without a person's knowledge. The exploit makes use of this to take control of a computer and install spyware, log personal information, send spam, or any other conceivable thing.
WHAT DOES IT DO?
This exploit is so easy to modify that new versions are popping up constantly, making it hard to say exactly what a particular variation will do. The exploit can be used to drop viruses, trojans, installers etc onto your computer when the exploit is activated (when the file is parsed by the part of windows with the problem). It does not do anything by itself until it is activated. Most reports so far have been of trojans being downloaded, which then download other things, other spyware, etc. Some of these are "SpyAxe", "AYL" trojan downloader, "ASC" trojan, and other stuff. There are also reports of variations that will install a "keylogger" program to capture everything you type into the computer; variations that will shut off services (antivirus, for instance) on your computer; variations that use your comptuer to send spam, and so forth. Generally it can be said that whatever the exploit it used for, it's up to no good.
Here's a video of what one version is doing: http://www.websensesecuritylabs.com...s/wmf-movie.wmv
HOW DOES IT SPREAD?
All you have to do to get infected is view a webpage that has the image on it, or access an infected image that is on your computer. It does not matter how the image ends up on your computer, just that it does. The file could also be a WMF renamed to any other image type, or possible other filetypes. Anything that puts the image exploit onto your computer or opens it up in windows fax viewer or the part of windows that generates thumbnails of WMF files is a vulnerability. This means any vector that puts the image onto your computer (wget, browser, email, IM, etc) can potentially cause the problem.
Current variations of the exploit are spreading using
- Fake instant messages telling you to click a link; clicking the link downloads or displays the picture
- Emails with a picture included or attached
- Web pages with the picture on them
- Anything else that could put your computer in contact with the image file
That means the forums can be a vector for infection too. (In fact, user Blue Reptile has already been permabanned for putting the exploit in his signature.)
WHO IS VULNERABLE?
This affects anyone on Windows (3.0, 3.1, 3.11, 95, 98, 98SE, ME, 2000, XP, 2003). The vulnerability is is Windows itself. Firefox, Internet Explorer, and any other browser that displayes or downloads the file into the cache on the local machine is one way the image can get onto your computer. Thus, USING FIREFOX DOES NOT ELIMINATE THE RISK as the file is still downloaded to your cache in most cases, but it does reduce your chances somewhat since the image is often not displayed in the browser. But if you then interact with the file in any way (thumbnail it, Google Desktop, hover over with the mouse) that causes it to be handled by the windows subsystem responsible for WMF then you will have problems. Once again, YOU CAN BE CAUGHT BY THIS EXPLOIT EVEN IF THE IMAGE DOES NOT SHOW IN THE BROWSER. If you use Windows, your system is vulnerable.
WHAT YOU CAN DO TO HELP PROTECT YOURSELF
1. SCAN YOUR COMPUTER - Update your defs and scan your comptuer. Even if you think you are safe, scan your Windows computer anyway. If you don't have antivirus software, NOD32 TRIAL VERSION is a good one and works as a trial for 30 days. Update the definitions right away after installing - they auto-update but you want to be sure you have the latest. I have personally tested NOD32 and found that it's AMON on-access scanner stopped the image as soon as it was saved to the cache, before it was able to execute anything.
Most AV companies should have definitions updated by now, but check to be sure that they protect against the actual exploit itself, not just against whatever trojan the exploit drops on the computer. NOTE: SCAN ALL FILES. Some AV solutions only scan "infectable" files and do not scan image files because the program thinks they are safe. Check for an option to scan all file types and make sure that is enabled.
Now that almost all AV software has some kind of definition for it, you can really use whatever you want and are comfortable with. So it's not like anyone is pushing you to go pay for NOD32 if you are already happy with what you have. There are still pros and cons to using each particular software.
Whichever AV you use, just make sure that:
1) You have your realtime scanner turned on for now, and
2) You set it to scan all files, including images (not just exe's anymore!), and
3) The AV software of your choice detects the actual exploit (all variations) and not just the payload it drops once activated.
2. USE AN ALTERNATIVE BROWSER - Using Firefox or an alternative browser will reduce your risk because it does not display the image. However the image is still downloaded to your cache, and some browsers prompt you to open the file - which you should not do!
3. TURN OFF SALR's feature that makes text links into images. If you have that feature turned on, someone could make just a text link that displays the infected image in your browser.
4. TURN OFF GOOGLE DESKTOP or anything else that does indexing of files on your computer.
5. USE COMMON SENSE - Don't go to links you don't trust, don't open files you aren't expecting, including suspicious email or IM's, etc.
6. KEEP ON TOP OF WINDOWS UPDATES - Hopefully they can fix this one quickly, but you really should be up-to-date on everything else anyway.
7. AVOID IMAGE SEARCHING and visiting webpages you don't trust. Some of the places this image has been popping up are: eBay XBOX auctions, porn sites, google image search, wikipedia, myspace, other forums, etc - places where people can post their own images. If you have a competent realtime scanner that can catch the image before it executes anything you are ahead of the game here.
BONUS TECHY STUFF
8. DISABLE WINDOWS THUMBNAILS - You can try unhooking the part of Windows that views those image files. To do this, click Start -> Run and type regsvr32 /u shimgvw.dll then press OK. You will get a confirmation message. To undo this, repeat but type regsvr32 shimgvw.dll instead. Note: This only has a minimal benefit - it only disables the image viewer itself. It doesn't prevent against viewing the exploit image in Internet Explorer, for example. Messing around with this is at your own risk
BOTTOM LINE: If you use Windows, you will not be 100% safe from this exploit until the problem in windows is patched - there is no official patch yet.
stolen from another forum I frequent:
-----------
UPDATE: Unofficial word from Microsoft is that the patch is DONE but it will be out January 10 as part of their regular schedule. They are testing it and localizing it for languages. Keep your Antivirus up to date and continue to follow the updated threat mitigation procedures below. If you are worried about new variations coming out faster than your Antivirus updates, see bullet point #9 for some temporary patches- both of which appear to remove the vulnerability.
WHAT IS IT?
There is a new exploit (with several variations) out that uses WMF (windows metafile format) files to infect a computer. The problem is in a file called GDI32.DLL, a part of Microsoft Windows that extracts information from WMF files. When a WMF file is created in a certain way, it can execute commands on the computer without a person's knowledge. The exploit makes use of this to take control of a computer and install spyware, log personal information, send spam, or any other conceivable thing.
WHAT DOES IT DO?
This exploit is so easy to modify that new versions are popping up constantly, making it hard to say exactly what a particular variation will do. The exploit can be used to drop viruses, trojans, installers etc onto your computer when the exploit is activated (when the file is parsed by the part of windows with the problem). It does not do anything by itself until it is activated. Most reports so far have been of trojans being downloaded, which then download other things, other spyware, etc. Some of these are "SpyAxe", "AYL" trojan downloader, "ASC" trojan, and other stuff. There are also reports of variations that will install a "keylogger" program to capture everything you type into the computer; variations that will shut off services (antivirus, for instance) on your computer; variations that use your comptuer to send spam, and so forth. Generally it can be said that whatever the exploit it used for, it's up to no good.
Here's a video of what one version is doing: http://www.websensesecuritylabs.com...s/wmf-movie.wmv
HOW DOES IT SPREAD?
All you have to do to get infected is view a webpage that has the image on it, or access an infected image that is on your computer. It does not matter how the image ends up on your computer, just that it does. The file could also be a WMF renamed to any other image type, or possible other filetypes. Anything that puts the image exploit onto your computer or opens it up in windows fax viewer or the part of windows that generates thumbnails of WMF files is a vulnerability. This means any vector that puts the image onto your computer (wget, browser, email, IM, etc) can potentially cause the problem.
Current variations of the exploit are spreading using
- Fake instant messages telling you to click a link; clicking the link downloads or displays the picture
- Emails with a picture included or attached
- Web pages with the picture on them
- Anything else that could put your computer in contact with the image file
That means the forums can be a vector for infection too. (In fact, user Blue Reptile has already been permabanned for putting the exploit in his signature.)
WHO IS VULNERABLE?
This affects anyone on Windows (3.0, 3.1, 3.11, 95, 98, 98SE, ME, 2000, XP, 2003). The vulnerability is is Windows itself. Firefox, Internet Explorer, and any other browser that displayes or downloads the file into the cache on the local machine is one way the image can get onto your computer. Thus, USING FIREFOX DOES NOT ELIMINATE THE RISK as the file is still downloaded to your cache in most cases, but it does reduce your chances somewhat since the image is often not displayed in the browser. But if you then interact with the file in any way (thumbnail it, Google Desktop, hover over with the mouse) that causes it to be handled by the windows subsystem responsible for WMF then you will have problems. Once again, YOU CAN BE CAUGHT BY THIS EXPLOIT EVEN IF THE IMAGE DOES NOT SHOW IN THE BROWSER. If you use Windows, your system is vulnerable.
WHAT YOU CAN DO TO HELP PROTECT YOURSELF
1. SCAN YOUR COMPUTER - Update your defs and scan your comptuer. Even if you think you are safe, scan your Windows computer anyway. If you don't have antivirus software, NOD32 TRIAL VERSION is a good one and works as a trial for 30 days. Update the definitions right away after installing - they auto-update but you want to be sure you have the latest. I have personally tested NOD32 and found that it's AMON on-access scanner stopped the image as soon as it was saved to the cache, before it was able to execute anything.
Most AV companies should have definitions updated by now, but check to be sure that they protect against the actual exploit itself, not just against whatever trojan the exploit drops on the computer. NOTE: SCAN ALL FILES. Some AV solutions only scan "infectable" files and do not scan image files because the program thinks they are safe. Check for an option to scan all file types and make sure that is enabled.
Now that almost all AV software has some kind of definition for it, you can really use whatever you want and are comfortable with. So it's not like anyone is pushing you to go pay for NOD32 if you are already happy with what you have. There are still pros and cons to using each particular software.
Whichever AV you use, just make sure that:
1) You have your realtime scanner turned on for now, and
2) You set it to scan all files, including images (not just exe's anymore!), and
3) The AV software of your choice detects the actual exploit (all variations) and not just the payload it drops once activated.
2. USE AN ALTERNATIVE BROWSER - Using Firefox or an alternative browser will reduce your risk because it does not display the image. However the image is still downloaded to your cache, and some browsers prompt you to open the file - which you should not do!
3. TURN OFF SALR's feature that makes text links into images. If you have that feature turned on, someone could make just a text link that displays the infected image in your browser.
4. TURN OFF GOOGLE DESKTOP or anything else that does indexing of files on your computer.
5. USE COMMON SENSE - Don't go to links you don't trust, don't open files you aren't expecting, including suspicious email or IM's, etc.
6. KEEP ON TOP OF WINDOWS UPDATES - Hopefully they can fix this one quickly, but you really should be up-to-date on everything else anyway.
7. AVOID IMAGE SEARCHING and visiting webpages you don't trust. Some of the places this image has been popping up are: eBay XBOX auctions, porn sites, google image search, wikipedia, myspace, other forums, etc - places where people can post their own images. If you have a competent realtime scanner that can catch the image before it executes anything you are ahead of the game here.
BONUS TECHY STUFF
8. DISABLE WINDOWS THUMBNAILS - You can try unhooking the part of Windows that views those image files. To do this, click Start -> Run and type regsvr32 /u shimgvw.dll then press OK. You will get a confirmation message. To undo this, repeat but type regsvr32 shimgvw.dll instead. Note: This only has a minimal benefit - it only disables the image viewer itself. It doesn't prevent against viewing the exploit image in Internet Explorer, for example. Messing around with this is at your own risk
BOTTOM LINE: If you use Windows, you will not be 100% safe from this exploit until the problem in windows is patched - there is no official patch yet.