mailing list archives
RE: WMF Exploit
From: Bill Busby <williambusby2001 () yahoo com>
Date: Thu, 29 Dec 2005 13:34:36 -0800 (PST)
It is not only *.wmf extensions it is all files that
have windows metafile headers that will open with the
Windows Picture and Fax Viewer. Any file that has the
header of a windows metafile can trigger this exploit.
--- "Hayes, Bill" <Bill.Hayes () owh com> wrote:
CERT now has posted Vulnerability Note VU#181038,
"Microsoft Windows may
be vulnerable to buffer overflow via specially
crafted WMF file"
(http://www.kb.cert.org/vuls/id/181038). The note
details about the exploit and its effects. Very few
been proposed other than blocking at the perimeter
remapping the .wmf extension to some application
other than the
vulnerable Windows Picture and Fax Viewer
From: davidribyrne () yahoo com
[mailto:davidribyrne () yahoo com]
Sent: Wednesday, December 28, 2005 4:18 PM
To: bugtraq () securityfocus com
Subject: WMF Exploit
Another quick observation, again, I apologize if
this information has
already been posted; I haven't been able to read all
the posts today.
The thumbnail view in Windows Explorer will parse
the graphics files in
a folder, even if the file is never explicitly
opened. This is enough to
trigger the exploit. Even more frightening is that
you don't have to use
the thumbnail view for a thumbnail to be generated.
circumstances, just single-clicking on the file will
cause it to be
Yahoo! for Good - Make a difference this year.