Secunia - Stay Secure
Secunia monitors vulnerabilities in more than 6500 products, e.g.:
Internet Explorer | Mozilla Firefox | Opera | View All Products
Home >> Secunia Advisories >> Microsoft Windows WMF "SETABORTPROC" Arbitrary Code Execution

Secunia Advisories
Historic Advisories
Listed By Product
Listed By Vendor
Statistics
About Advisories
Secunia Research

Virus Information
Chronological List
Last 10 Virus Alerts
About Virus Info

Secunia Advisories
Weekly Summary
Secunia Virus Alerts


Microsoft Windows WMF "SETABORTPROC" Arbitrary Code Execution

Secunia Advisory:SA18255Print Advisory  
Release Date:2005-12-28
Last Update:2005-12-29

Critical:
Extremely critical
Impact:System access
Where:From remote
Solution Status:Unpatched

OS:Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Web Edition
Microsoft Windows XP Home Edition
Microsoft Windows XP Professional

Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.

CVE reference:CVE-2005-4560

Description:
A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to an error in the handling of Windows Metafile files (".wmf") containing specially crafted SETABORTPROC "Escape" records. Such records allow arbitrary user-defined function to be executed when the rendering of a WMF file fails. This can be exploited to execute arbitrary code by tricking a user into opening a malicious ".wmf" file in "Windows Picture and Fax Viewer" or previewing a malicious ".wmf" file in explorer (i.e. opening a folder containing a malicious image file).

The vulnerability can also be exploited automatically when a user visits a malicious web site using Microsoft Internet Explorer.

NOTE: Exploit code is publicly available. This is being exploited in the wild. The vulnerability can also be triggered from explorer if the malicious file has been saved to a folder and renamed to other image file extensions like ".jpg", ".gif, ".tif", and ".png" etc.

The vulnerability has been confirmed on a fully patched system running Microsoft Windows XP SP2. Microsoft Windows XP SP1 and Microsoft Windows Server 2003 SP0 / SP1 are reportedly also affected. Other platforms may also be affected.

Solution:
Do not save, open or preview untrusted image files from email or other sources, or open untrusted folders and network shares in explorer.

Set security level to "High" in Microsoft Internet Explorer to prevent automatic exploitation.

The risks can be mitigated by unregistering "Shimgvw.dll". However, this will disable certain functionalities. Secunia do not recommend the use of this workaround on production systems until it has been thoroughly tested.

Provided and/or discovered by:
First reported in the wild by "noemailpls".

Exploit code and additional information provided by H D Moore.

Changelog:
2005-12-29: Updated advisory.

Original Advisory:
Microsoft (KB912840):
http://www.microsoft.com/technet/security/advisory/912840.mspx

Other References:
US-CERT VU#181038:
http://www.kb.cert.org/vuls/id/181038


Please note: The information, which this Secunia Advisory is based upon, comes from third party unless stated otherwise.

Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.


Send Feedback to Secunia:

If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either our web form or email us at vuln@secunia.com.

Ideas, suggestions, and other feedback is most welcome.


Found: 139 Related Secunia Security Advisories, displaying 10

- Microsoft IIS Malformed URL Potential Denial of Service Vulnerability
- Microsoft Windows UPnP GetDeviceList Denial of Service
- Microsoft Windows WMF/EMF File Rendering Arbitrary Code Execution
- Microsoft Windows Shell and Web View Three Vulnerabilities
- Microsoft Collaboration Data Objects Buffer Overflow Vulnerability
- Microsoft Windows Plug-and-Play Service Arbitrary Code Execution
- Microsoft Windows Client Service for NetWare Buffer Overflow
- Microsoft Windows FTP Client Filename Validation Vulnerability
- Microsoft Windows MSDTC and COM+ Vulnerabilities
- Microsoft Windows DirectShow AVI Handling Vulnerability

Show all related advisories


Receive all Secunia Security Advisories Free:


Read more about our mailing list.





Search



Secunia News

2005-11-21
Proof of Concept code has been released for a 6 months old Internet Explorer vulnerability. Criticality rating increased to Extremely Critical.

- - - - - - - - -

2005-06-21
Multiple browsers are vulnerable to the Dialog Origin Spoofing Vulnerability.

- - - - - - - - -

2005-04-04
Various Mozilla browsers are vulnerable to the Mozilla Arbitrary Memory Exposure Vulnerability.

- - - - - - - - -

2005-03-17
Want a new IT Security job?
Vacant positions at Secunia


Secunia Feeds

Secunia Advisories
Get the RSS feed or use our HTML version.

Secunia Virus Alerts
Get the RSS feed.

Special Requests
Special requests for your website can be sent to our support, or read more about featuring Secunia information here.


Terms & Conditions - Confidentiality - Copyright Secunia - Compliance - Contact Secunia