Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

[Windows] JPEG exploit toolkit spotted online

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » The DU Lounge Donate to DU
 
Kellanved Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Sep-26-04 01:38 PM
Original message
[Windows] JPEG exploit toolkit spotted online
toolkit designed to exploit a recently-disclosed Microsoft JPEG vulnerability has been released onto the net. The toolkit (screen shot from AV firm F-Secure here) makes it trivially easy for maliciously-minded attackers, however unskilled they might be, to exploit unpatched Windows systems and run malicious code.

The attack mechanism used here takes advantage of a recently discovered flaw in the way Microsoft applications process JPEG image files. Malformed JPEG files are capable of triggering a buffer overflow in a common Windows component (the GDI+ image viewing library), it was revealed last week. This behaviour creates a ready mechanism to inject exploit code into vulnerable systems. Windows XP and Windows Server 2003 make use of vulnerable library by default. Other Windows OSes might be vulnerable, depending on what applications users have installed.

Microsoft, which unsurprisingly rates the vulnerability as critical, released a patch to defend against the flaw on 14 September. To be at risk, users have to open a JPEG file modified to trigger the flaw using either IE or Outlook. They also need to be unpatched. Unfortunately there's plenty of scope for both conditions to be met and the gene pool of potential victims is huge.

The problem is exacerbated by the fact JPEG files are typically viewed "as a benign and trusted file format... as such it is possible to cause image files to be viewed with minimal user-interaction through several applications including many email clients such as Outlook and Outlook Express," Security tools vendor ISS notes. "There is also potential for automatic exploitation in the form of a network-propagating worm."

...
http://www.theregister.co.uk/2004/09/24/jpeg_exploit_toolkit/

Also there is another JPEG Exploit around, not patched by MS yet. The other one (null pointer dreference) has no known security risks, but can be used to crash a Windows PC - even with all patches installed.
Printer Friendly | Permalink |  | Top
Rabrrrrrr Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Sep-26-04 01:52 PM
Response to Original message
1. Damn, I wish those evil clowns (not the MS ones, the malicious code ones)
(meaning, those who make code intentionally to destroy computers, as opposed to the malicious code writers at MS who make code intentionally to be shitty so they can sell upgrades) would have their nuts ripped off, and then use their intelligence and skills for the cause of good.
Printer Friendly | Permalink |  | Top
 
salvorhardin Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Sep-26-04 01:57 PM
Response to Original message
2. Please note
if you are using either the latest version of the Mozilla Browser Suite or the Mozilla Firefox standalone browser you should know that they are not succeptible to this attack.

If you aren't... well, why not?


http://browsehappy.com


http://www.mozilla.org
Printer Friendly | Permalink |  | Top
 
Kellanved Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Sep-26-04 02:07 PM
Response to Reply #2
3. that is actually only half true
The exploit does not reside in the ie, but in an OS library.
So any unpatched application using the MS picture library is vulnerable. This includes office, the windows explorer,...

Mozilla does indeed use another Picture Library: the "libpr0n" porn rendering library (honestly!).


Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Tue Apr 23rd 2024, 04:06 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » The DU Lounge Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC