Skip to main content

Hacker releases working GDI-bug attack code

Jack Writes: Security researchers on Monday spotted malicious code that triggers a critical vulnerability in the Chinese version of Windows 2000, and warned users of other editions to expect attacks.

 

Symantec Corp. confirmed that the proof-of-concept code publicly posted to the milw0rm.com site earlier in the day successfully attacks Chinese editions of Windows 2000 Service Pack 4 (SP4) by exploiting one of the two critical bugs in Windows GDI (graphics device interface) that Microsoft Corp. patched last week.

But while the attack code works on Chinese versions of Windows, it doesn't when pitched against other editions. Rather than allow hackers to execute additional code -- malware to hijack the PC, for instance -- the exploit simply crashes Explorer, the Windows file manager, on non-Chinese versions of the operating system.

 

"This exploit will not successfully allow for remote code execution against English systems, [but it] can successfully trigger a crash on English versions of Microsoft Windows," Symantec wrote in an analysis for customers of its DeepSight threat notification service.

 

The news followed reports from Symantec last Thursday that it had captured an exploit. Analysis then, however, determined that the attack -- made up of multiple Enhanced Metafile images disguised as JPEG files -- wasn't crafted properly and wouldn't actually trigger the vulnerability.

 

A week ago, Microsoft patched the GDI bugs in every currently supported version of Windows, including the very newest, Vista SP1 and Server 2008. Windows XP SP3, the not-yet-finished final service pack, did not require patching because it had been fixed two weeks before.

 

The publication of the exploit sent Symantec to the alarm button. "Due to the availability of this public exploit for Chinese versions of Windows, it is likely that attackers will modify this exploit to target English versions of the operating system," it said Monday. As it did last week, the company also urged users to deploy the fixes outlined by Microsoft in its MS08-021 security bulletin if they have not already done so.

 

 

 

 


Your IP address:

18.220.55.82

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast

Firewall Analyzer

zoho firewall analyzer