Contact Us Today! (215) 853-2266

Bardissi Enterprises Blog

Bardissi Enterprises has been serving the Hatfield area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Windows GDI+ Vulnerability Affects Many MS Products

Severity: High

9 September, 2008


Summary:

§ These vulnerabilities affect: Recent versions of Windows and many other Microsoft products (see “Exposure” section for full details)

§ How an attacker exploits them: By enticing your users into viewing malicious images or graphical content, including content hosted on a malicious Web site

§ Impact: Remote attacker can execute code, potentially gaining complete control of your computers

§ What to do: Install the appropriate Microsoft patches immediately

Severity: High

9 September, 2008


Summary:

§ These vulnerabilities affect: Recent versions of Windows and many other Microsoft products (see “Exposure” section for full details)

§ How an attacker exploits them: By enticing your users into viewing malicious images or graphical content, including content hosted on a malicious Web site

§ Impact: Remote attacker can execute code, potentially gaining complete control of your computers

§ What to do: Install the appropriate Microsoft patches immediately

Exposure:

Today, Microsoft released a security bulletin describing five vulnerabilities that affect the Graphical Device Interface (GDI+), one of the core Windows subsystems responsible for outputting graphical objects to your monitor or printer. Since it’s such an essential subsystem, the GDI+ component resides in many other Microsoft products as well. For that reason, these vulnerabilities also affect the following products to some extent:

§ Internet Explorer

§ Office

§ Visio

§ Works

§ .NET Framework

§ Digital Image Suite

§ SQL Server

§ Visual Studio

§ Report Viewer

§ Visual FoxPro

§ Forefront Client Security

While the five vulnerabilities differ technically, they all involve flaws in the way GDI+ handles different types of images or graphic objects, and all have the same result. By tricking one of your users into viewing a specially crafted image, or malicious web site containing booby-trapped graphical content, an attacker could exploit any of these flaws to execute code on that user’s computer, with the user’s privileges. If your users have local administrator privileges, an attacker could leverage these flaws to gain complete control of their Windows machines.

The primary difference of note between these flaws has to do with which graphic files the attacker can use to exploit them. The potentially dangerous images and graphic objects that could trigger these flaws include:

§ BMP images (.bmp)

§ GIF images (.gif)

§ EMF images (.emf)

§ WMF images (.wmf)

§ VML graphical objects

These flaws pose a very serious risk and affect quite a menagerie of Microsoft software. You should apply the patches immediately.

Solution Path:

Microsoft has released patches for Windows, and many other products, which correct all of these vulnerabilities. You should download, test, and deploy the appropriate patches throughout your network immediately.

§ Windows

§ 2000

§ w/Internet Explorer 6

§ w/.NET Framework 1.0

§ w/.NET Framework 1.1

§ w/.NET Framework 2.0

§ w/.NET Framework SP1 2.0

§ XP

§ XP x64

§ Server 2003

§ Server 2003 x64

§ Server 2003 Itanium

§ Vista

§ Vista x64

§ Server 2008

§ Server 2008 x64

§ Server 2008 Itanium

§ Office

§ XP

§ 2003

§ 2007

§ Office related software

§ Visio 2002

§ Powerpoint Viewer 2003

§ Works 8

§ Digital Image Suite 2006

§ SQL Server

§ SQL Server 2000 (all versions) [QFE ]

§ SQL Server 2005 (all versions) [ GDR / QFE ]

Note: For the differences between GDR and QFE releases, see this Microsoft blog post

§ Developer Tools

§ Visual Studio

§ 2002

§ 2003

§ 2005

§ 2008

§ Report Viewer

§ 2005

§ 2008

§ Visual FoxPro (when installed on Windows 2000)

§ 8.0

§ 9.0 w/SP1

§ 9.0 w/SP2

§ Microsoft Platform SDK Redistributable: GDI+

§ Security Software

§ Forefront Client Security 1.0

For All WatchGuard Users:

WatchGuard Firebox administrators can configure the HTTP and SMTP proxies to block the affected image files. However, this would significantly hinder your users’ Web browsing experience. Therefore, the patches above are your best solution.

Status:

Microsoft has released patches correcting these issues.

References:

§ Microsoft Security Bulletin MS08-052

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Recent Comments

Tip of the Week: Which Headphones are Right for Your Needs?
23 April 2018
I will recommend Plantronics Backbeat Pro 2 SE Noise cancelling Headset with it's Great features.
Gamification: Make Business Fun for Everyone
27 January 2017
The world is based on the games. There are many types of games as per the aussie essay writing servi...
Let's Talk Tablets
12 January 2017
The concept of tablet is far better than that of PC because you can bring them with you everywhere a...
Tip of the Week: Tweak Your Workday in These 4 Ways and See Major Results
12 January 2017
The only thing will I will say regarding this blog is that it is very helpful at least for me. As I ...
WatchGuard Releases Version 10.2.7 for WSM, Edge, Fireware, and Fireware Pro
23 December 2016
I really needed to know about the fireware but i was confused that where can i find information abou...