Feeds

Critical MS patch fixes graphics bugs

Cracked rendering

Next gen security for virtualised datacentres

Microsoft has released a patch to address two critical vulnerabilities in Windows, both related to the processing of graphics files, that might by used by hackers to take control of vulnerable systems.

The first vulnerability involves a flaw in Windows' Graphics Rendering Engine which comes into play when rendering certain malformed Windows Metafile (WMF) and Enhanced Metafile (EMF) image files. The security bug created a means to execute arbitrary code on vulnerable system via a specially crafted, malformed WMF/EMF file.

eEye Digital Security, the firm which discovered the flaw, said that Microsoft's fix for the critical flaw doesn't come a day too soon. "The flaw was reported March 29 — more than 200 days ago — and has been marked with a 'high' severity rating by Microsoft, as it allows malicious code to be executed with minimal user interaction through commonly used media, such as HTML, email, a link to a web page or instant messenger," it said.

The second critical flaw is a similar, high-risk heap overflow in WMF. The bug created a means for hackers to inject malware into vulnerable Windows boxes providing a user can be induced into viewing a maliciously constructed image. As with the first flaw, hackers might exploit the vulnerability by embedding the image in an Office document, or by convincing the user to view an HTML email in Outlook containing an image attachment, or via a malicious web site. Credit for discovering the second flaw goes to Venustech AdDLab, eEye Digital Security and Symantec Security Response.

Both flaws affects Windows 2000, Windows NT 4.0, Windows Server 2003 and Windows XP (even those running SP2 - Microsoft's highly promoted security update) machines. That means just about every Windows user will need to apply Microsoft patch (MS05-053), the single patch released by the software giant this month as part of its regular Patch Tuesday monthly update cycle. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?