North American Network Operators Group|
Date Prev | Date Next |
Date Index |
Thread Index |
Author Index |
Re: WMF patch
- From: Eric Frazier
- Date: Thu Jan 05 12:53:12 2006
At 01:40 AM 1/5/2006, Thomas Kuehling wrote:
Am Mittwoch, den 04.01.2006, 08:14 -0800 schrieb Eric Frazier:
> I finally decided this was serious enough to do something about it sooner
> than the MS patch, but while this seems to be the official link to the
> patch http://isc1.sans.org/diary.php?storyid=1010
> it also is timing out. I have seen a couple of other links from
> people who have "repackaged" this, but I really don't want to download
> something that doesn't match the SANS MD5..
> Any links or suggestions?
perhaps it is outdated, but as a workaround, it would be enough to
unregister the DLL wich handles WMF:
on the Start menu, choose Run, type "regsvr32 -u %windir%\system32
\shimgvw.dll", and then click OK.
For more details, visit this link:
Thanks Thomas, something really useful. One thing I am still curious about,
I read that there were other image formats can be used in an exploit, GIF,
.BMP, .JPG, .TIF can also be used, according to F-Secure. I find this a
little confusing, if that dll only deals with WMF file type then the
exploit must not be directly connected with that dll Or does that dll
handle all of those as well?
But then I found this http://www.pcworld.com/howto/article/0,aid,119993,00.asp
Which makes sense. The way a lot of things I have been seeing go on about
this they act like WMF is the only format of issue and that obviously is
not at all true. I would have more likely ignored this if it really was
only WMF files and the MS patch a week or so away.
Mit freundlichen Grüßen
Mapsolute Gmbh - Techn. Administration - TK2325-RIPE