Fully patched systems running Windows XP and Windows Server 2003 can be successfully attacked by malicious hackers, various security companies warned this week.
The attacks can be carried out through a newly discovered vulnerability in the way those operating systems handle corrupted .WMF (Windows Metafile) graphic files, the companies said.
The firms describe the exploit as "zero day" because malicious hackers are taking advantage of it while there is no patch or certified work-around against the vulnerability.
Malicious hackers can run the code of their choice on compromised systems, but even machines that have all available patches installed are vulnerable, according to several advisories.
Currently, security firms are warning that machines can be attacked if users do any of the following:
- Visit hostile Web sites hosting exploits.
- Open a malicious .WMF file in Windows Picture and Fax Viewer.
- Preview a malicious .WMF file in Windows Explorer.
However, the number of attacks could increase dramatically if malicious hackers find more automated ways to target systems, such as using e-mail, instant messages or file sharing, according to Ken Dunham, director of the rapid response team at VeriSign Inc.'s iDefense.
Attacks so far have been limited to installation of adware and spyware on compromised machines, but "you're probably going to see Trojans and more sinister code develop and emerge in the next few days," Dunham said in an interview.
There is no patch for the security hole. While some work-arounds are being suggested on the Web, Dunham is only validating this one for disabling .WMF file handling: Users should click on the Start button on the task bar. Then they should click on Run, type "regsvr32 /u shimgvw.dll" and click "OK" when the change dialog box appears.
However, Dunham warns that recent vulnerabilities related to .WMF have also included .EMF files and that "it is possible that exploitation might still be possible through alternative file types such as EMF," he wrote in an e-mail alert this afternoon. "For now, the WMF disabling work-around may help mitigate attacks against vulnerable Windows XP/2003 computers. This work-around may impact the display of thumbnails or other images on the computer."
Microsoft Corp. is investigating "new public reports of a possible vulnerability in Windows," a spokesman from Microsoft's public relations agency Waggener Edstrom wrote in an e-mail. "Upon completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a fix through our monthly release process or issuing a security advisory, depending on customer needs."
In the meantime, Microsoft encourages its customers follow its recommended security practices, detailed at www.microsoft.com/protect, the spokesman wrote. Users who believe they have been affected can contact Microsoft's product support team, he wrote. Ways to make this contact vary depending on where users are based. More information can be found at http://support.microsoft.com/security.
Dunham characterized the threat as "significant," while Secunia rated it "extremely critical." Symantec Corp. labels it as a "level two" threat, on a scale in which "level four" is the most critical.
Secunia listed the vulnerable operating systems as Windows Server 2003 Datacenter Edition, Windows Server 2003 Enterprise Edition, Windows Server 2003 Standard Edition, Windows Server 2003 Web Edition, Windows XP Home Edition and Windows XP Professional.