Results 1 to 16 of 16

Thread: New Windows Virus With No Fix!!!

Hybrid View

  1. #1
    IA's deaf kid Deaf Pimp's Avatar
    Join Date
    Mar 2005
    Location
    In my bed...
    Age
    42
    Posts
    2,637
    Rep Power
    24

    Default

    Its a hoax.
    2005.5 Audi A4 2.0t Quattro
    APR 93/100 Chip

  2. #2
    When negotiations fail... Ruiner's Avatar
    Join Date
    Apr 2003
    Location
    Atlanta, GA
    Age
    50
    Posts
    4,631
    Rep Power
    29

    Default

    Quote Originally Posted by Deaf Pimp
    Its a hoax.
    Sure?

    Thursday, December 29, 2005

    WMF, day 2 Posted by Mikko @ 08:30 GMT Microsoft and CERT.ORG have issued bulletins on the Windows Metafile vulnerability:
    http://www.microsoft.com/technet/sec...ry/912840.mspx
    http://www.kb.cert.org/vuls/id/181038

    Microsoft's bulletin confirms that this vulnerability applies to all the main versions of Windows: Windows ME, Windows 2000, Windows XP and Windows 2003.

    They also list the REGSVR32 workaround. It's a good idea to use this while waiting for a patch. To quote Microsoft's bulletin:

    Un-register the Windows Picture and Fax Viewer (Shimgvw.dll)

    1. Click Start, click Run, type "regsvr32 -u %windir%\system32\shimgvw.dll"
    (without the quotation marks), and then click OK.


    2. A dialog box appears to confirm that the un-registration process has succeeded.
    Click OK to close the dialog box.


    Impact of Workaround: The Windows Picture and Fax Viewer will no longer be started
    when users click on a link to an image type that is associated with the Windows Picture and Fax Viewer.


    To undo this change, re-register Shimgvw.dll by following the above steps.
    Replace the text in Step 1 with “regsvr32 %windir%\system32\shimgvw.dll” (without the quotation marks).


    This workaround is better than just trying to filter files with a WMF extension. There are methods where files with other image extensions (such as BMP, GIF, PNG, JPG, JPEG, JPE, JFIF, DIB, RLE, EMF, TIF, TIFF or ICO) could be used to exploit a vulnerable machine.

    We got several questions on our note on Google Desktop yesterday. Bottom line is that if an image file with the exploit ends up to your hard drive, Google Desktop will try to index it and will execute the exploit in the process. There are several ways such a file could end up to the local drive. And this indexing-will-execute problem might happen with other desktop search engines too.

    And finally, you might want to start to filter these domains at your corporate firewalls too. Do not visit them.

    toolbarbiz[dot]biz
    toolbarsite[dot]biz
    toolbartraff[dot]biz
    toolbarurl[dot]biz
    buytoolbar[dot]biz
    buytraff[dot]biz
    iframebiz[dot]biz
    iframecash[dot]biz
    iframesite[dot]biz
    iframetraff[dot]biz
    iframeurl[dot]biz

    So far, we've only seen this exploit being used to install spyware or fake antispyware / antivirus software on the affected machines. I'm afraid we'll see real viruses using this soon.

    We've seen 57 different versions of malicious WMF files so far. We detect them all as PFV-Exploit.
    AIM: RuinerTT
    2005 Nissan Pathfinder LE

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
About us
ImportAtlanta is a community of gearheads and car enthusiasts. It does not matter what kind of car or bike you drive, IA is an open community for any gearhead. Whether you're looking for advice on a performance build or posting your wheels for sale, you're welcome here!
Announcement
Welcome back to ImportAtlanta. We are currently undergoing many changes, so please report any issues you encounter with the site using the 'Contact Us' button below. Thank you!