Feeds

Critical MS patch fixes graphics bugs

Cracked rendering

Remote control for virtualized desktops

Microsoft has released a patch to address two critical vulnerabilities in Windows, both related to the processing of graphics files, that might by used by hackers to take control of vulnerable systems.

The first vulnerability involves a flaw in Windows' Graphics Rendering Engine which comes into play when rendering certain malformed Windows Metafile (WMF) and Enhanced Metafile (EMF) image files. The security bug created a means to execute arbitrary code on vulnerable system via a specially crafted, malformed WMF/EMF file.

eEye Digital Security, the firm which discovered the flaw, said that Microsoft's fix for the critical flaw doesn't come a day too soon. "The flaw was reported March 29 — more than 200 days ago — and has been marked with a 'high' severity rating by Microsoft, as it allows malicious code to be executed with minimal user interaction through commonly used media, such as HTML, email, a link to a web page or instant messenger," it said.

The second critical flaw is a similar, high-risk heap overflow in WMF. The bug created a means for hackers to inject malware into vulnerable Windows boxes providing a user can be induced into viewing a maliciously constructed image. As with the first flaw, hackers might exploit the vulnerability by embedding the image in an Office document, or by convincing the user to view an HTML email in Outlook containing an image attachment, or via a malicious web site. Credit for discovering the second flaw goes to Venustech AdDLab, eEye Digital Security and Symantec Security Response.

Both flaws affects Windows 2000, Windows NT 4.0, Windows Server 2003 and Windows XP (even those running SP2 - Microsoft's highly promoted security update) machines. That means just about every Windows user will need to apply Microsoft patch (MS05-053), the single patch released by the software giant this month as part of its regular Patch Tuesday monthly update cycle. ®

Intelligent flash storage arrays

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
Oi, Europe! Tell US feds to GTFO of our servers, say Microsoft and pals
By writing a really angry letter about how it's harming our cloud business, ta
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.