Re: WMF patch

2006-01-05 Thread Robert Boyle


At 12:54 PM 1/5/2006, you wrote:
Thanks Thomas, something really useful. One thing I am still curious 
about, I read that there were other image formats can be used in an 
exploit, GIF, .BMP, .JPG, .TIF  can also be used, according to 
F-Secure. I find this a little confusing, if that dll only deals 
with WMF file type then the exploit must not be directly connected 
with that dll Or does that dll handle all of those as well?


But then I found this http://www.pcworld.com/howto/article/0,aid,119993,00.asp

Which makes sense. The way a lot of things I have been seeing go on 
about this they act like WMF is the only format of issue and that 
obviously is not at all true. I would have more likely ignored this 
if it really was only WMF files and the MS patch a week or so away.


I believe Windows uses the file header/descriptor data as well as or 
instead of the extension to know how to handle images. Otherwise, 
simply renaming/blocking all WMF files would result in an effective 
mitigation method.


-Robert



Tellurian Networks - The Ultimate Internet Connection
http://www.tellurian.com | 888-TELLURIAN | 973-300-9211
"Well done is better than well said." - Benjamin Franklin



Re: WMF patch

2006-01-05 Thread Eric Frazier


At 01:40 AM 1/5/2006, Thomas Kuehling wrote:

Hi Eric

Am Mittwoch, den 04.01.2006, 08:14 -0800 schrieb Eric Frazier:
> Hi,
>
> I finally decided this was serious enough to do something about it sooner
> than the MS patch, but while this seems to be the official link to the 
SANS

> patch http://isc1.sans.org/diary.php?storyid=1010
> it also is timing out. I have seen a couple of other links from 
googling to

> people who have "repackaged" this, but I really don't want to download
> something that doesn't match the SANS MD5..
>
> Any links or suggestions?

perhaps it is outdated, but as a workaround, it would be enough to
unregister the DLL wich handles WMF:

on the Start menu, choose Run, type "regsvr32 -u %windir%\system32
\shimgvw.dll", and then click OK.

For more details, visit this link:
http://www.frsirt.com/english/advisories/2005/3086



Thanks Thomas, something really useful. One thing I am still curious about, 
I read that there were other image formats can be used in an exploit, GIF, 
.BMP, .JPG, .TIF  can also be used, according to F-Secure. I find this a 
little confusing, if that dll only deals with WMF file type then the 
exploit must not be directly connected with that dll Or does that dll 
handle all of those as well?


But then I found this http://www.pcworld.com/howto/article/0,aid,119993,00.asp

Which makes sense. The way a lot of things I have been seeing go on about 
this they act like WMF is the only format of issue and that obviously is 
not at all true. I would have more likely ignored this if it really was 
only WMF files and the MS patch a week or so away.



Thanks,

Eric




Mit freundlichen Grüßen
Thomas Kühling

--
Mapsolute Gmbh - Techn. Administration - TK2325-RIPE




Re: [ok] Re: WMF patch

2006-01-05 Thread william(at)elan.net



On Wed, 4 Jan 2006, Fred Heutte wrote:


My observation had more to do with the posturing of the "security"
vendors (anti-virus, firewall, IDS, etc.) and the broad range of
highly important experts who are all clamoring for attention on
this and on all the other everyday security issues out there.
There is certainly a need for security services and products and
activities, but I am just not enamored of the "security mindset."
This is just a part of what our job is so let's get on with it.

And if we can convince the PHBs that moving off of Windows is
(1) feasible, which is obvious; (2) manageable for them, which is
not so clear, so much the better.  I've broken my hammer pounding
this particular nail, so having failed at moving management away
from Windows, I moved myself away from management.


You do of course realize that there is entire industry and quite a
number of vendors whose main products involve fixing bugs, closing
holes and providing timely updates for that insecure and buggy OS.
If the OS was not like that, the industry would be much smaller as
would the job area that involve security and other associates OS
maintanance actiity. Notice also that most managers do come from
the MS world and they see this all as quite normal after many years.

--
William Leibzon
Elan Networks
[EMAIL PROTECTED]


Re: WMF patch

2006-01-05 Thread Alexander Harrowell
Indeed. It's the security equivalent of "the market can stay irrational
longer than you can stay solvent" - perhaps we could reformulate that
as "the users can remain clueless longer than your business can survive
the DDOS"On 1/5/06, Stephane Bortzmeyer <[EMAIL PROTECTED]> wrote:
On Wed, Jan 04, 2006 at 05:58:16PM -0500, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote a message of 46 lines which said:
> How many times do you propose we FTDT before we get fed up and ask> upper management to authorize a migration to some other software> with a better record? And how many more FTDT's do we need to
> tolerate while we wait for upper management to authorize a> migration?There is no limit to what human beings can stand before becomingreasonable. That is human nature and the engineers' rationality is no
match for it.Think about religion, for instance. A lot of people still believe in asupernatural being despite a very bad track record (much worse thanMS-Windows').


Re: WMF patch

2006-01-05 Thread Stephane Bortzmeyer

On Wed, Jan 04, 2006 at 05:58:16PM -0500,
 [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote 
 a message of 46 lines which said:

> How many times do you propose we FTDT before we get fed up and ask
> upper management to authorize a migration to some other software
> with a better record? And how many more FTDT's do we need to
> tolerate while we wait for upper management to authorize a
> migration?

There is no limit to what human beings can stand before becoming
reasonable. That is human nature and the engineers' rationality is no
match for it.

Think about religion, for instance. A lot of people still believe in a
supernatural being despite a very bad track record (much worse than
MS-Windows').
 


Re: WMF patch

2006-01-04 Thread Martin Hannigan

> 
> 
> Martin Hannigan quoth:
> 
>   Internet security problems at large haven't even reached the break
>   of dawn yet. Wait until every phone, toaster, baby intensive care
>   sensor, and car is hooked up.
> 
> Indeed, depending on how you look at it, Vint Cerf's formulation,
> "IP on everything," is either a promise or a threat.  Maybe both.
> 
> http://content.answers.com/main/content/img/CDE/_IPONEV.GIF

Of course you know that this is Vint Cerf and it is clearly something
he would never do.

> http://old-www.nersc.gov/aboutnersc/presentations/future/sld061.htm
> 
> OK, now I'll shut up.

Thanks. I was being serious. Internet security isn't a joke at anyones
expense anymore. I'd like to think that everyone is thinking about the
future of the Internet. 

I think this is an interesting argument _for_ full disclosure even
though it's being cast as a debacle.

-M<


Re: WMF patch

2006-01-04 Thread Fred Heutte

Martin Hannigan quoth:

  Internet security problems at large haven't even reached the break
  of dawn yet. Wait until every phone, toaster, baby intensive care
  sensor, and car is hooked up.

Indeed, depending on how you look at it, Vint Cerf's formulation,
"IP on everything," is either a promise or a threat.  Maybe both.

http://content.answers.com/main/content/img/CDE/_IPONEV.GIF

http://old-www.nersc.gov/aboutnersc/presentations/future/sld061.htm

OK, now I'll shut up.

Fred




Re: [ok] Re: WMF patch

2006-01-04 Thread Martin Hannigan

> I understand the frustration Valdis has with the Microsoft situation.
> I've done my share of patching and updating and crawling under
> desks and wrestling with Exchange Server and all the rest,
> and fortunately (for my sanity) I'm not managing a few dozen
> M$ desktops anymore.  
> 
> My observation had more to do with the posturing of the "security" 
> vendors (anti-virus, firewall, IDS, etc.) and the broad range of 
> highly important experts who are all clamoring for attention on 

All the markets are up. Almost all the security companies are down.
Outbreaks cost money. They suck up resources. 

How are the ISP's that are competing on TV as secure networks
fairing on this? Are their customers calling their call centers?

> this and on all the other everyday security issues out there.  
> There is certainly a need for security services and products and 
> activities, but I am just not enamored of the "security mindset."  
> This is just a part of what our job is so let's get on with it.  
> 
> And if we can convince the PHBs that moving off of Windows is 
> (1) feasible, which is obvious; (2) manageable for them, which is 
> not so clear, so much the better.  I've broken my hammer pounding
> this particular nail, so having failed at moving management away
> from Windows, I moved myself away from management.  

Realistically, it's irrelevant. MS is their target because of marketshare.
The next market leader will be subject to the same effort. How many 
times have you heard of SGI having massive security flaws exploited
endangering the Internet? They do, but they aren't that big a slice
of the pie so the effort is less worthwhile and profitable. 

The 30 PC network of unmanaged machines is a far bigger 
problem. Let's pray that they get a zombie and they get
one someones botnet report so they can get fixed. The hammer
seems to kinda sorta work these days.

SP's have had a hand here. Back in the trumpet winsock days
we were screaming for ease of use so our support costs would go
down. Well, they did it. And the end users loved it. It can't be
just taken away. 

Internet security problems at large haven't even reached the break
of dawn yet. Wait until every phone, toaster, baby intensive care
sensor, and car is hooked up.

-M<




Re: [ok] Re: WMF patch

2006-01-04 Thread Brandon Butterworth

> And if we can convince the PHBs that moving off of Windows is 
> (1) feasible, which is obvious; (2) manageable for them

(3) they won't end up like Peter Quinn

http://www.theregister.co.uk/2005/12/29/mass_odf_cio/


brandon


Large-Scale Manageability [Was: Re: [ok] Re: WMF patch]

2006-01-04 Thread Fergie

A few dozen?

Try >10,000. Or 20,000. Or more.

Believe me -- I am glad I'm a network plumber -- I don't envy
the administrative job of managing an enterpise boat-load of MS
desktops -- it's a nightmare.Bbut it would perhaps be more of a
nightmare if they were not MS.

I've seen the scope firsthand, and I repect those folks immensely.

The problems here are many, and needless to say, we shouldn't
be trying to re-hash the debate on the appropriate desktop
enterprise OS, etc. -- that's a dead-end.

What _is_ handy is that that there nice tools available to roll
out patches to each end-system in a manageable fashion.

Now -- if only the patch were available...  :-)

And keeping users' from surfing the web and _not_ clicking on
exploit web pages is an exercise left for the reader (without being
a network nazi)...

- ferg

-- Fred Heutte <[EMAIL PROTECTED]> wrote:

I understand the frustration Valdis has with the Microsoft situation.
I've done my share of patching and updating and crawling under
desks and wrestling with Exchange Server and all the rest,
and fortunately (for my sanity) I'm not managing a few dozen
M$ desktops anymore.  

My observation had more to do with the posturing of the "security" 
vendors (anti-virus, firewall, IDS, etc.) and the broad range of 
highly important experts who are all clamoring for attention on 
this and on all the other everyday security issues out there.  
There is certainly a need for security services and products and 
activities, but I am just not enamored of the "security mindset."  
This is just a part of what our job is so let's get on with it.  

And if we can convince the PHBs that moving off of Windows is 
(1) feasible, which is obvious; (2) manageable for them, which is 
not so clear, so much the better.  I've broken my hammer pounding
this particular nail, so having failed at moving management away
from Windows, I moved myself away from management.  

Fred   


--
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 [EMAIL PROTECTED] or [EMAIL PROTECTED]
 ferg's tech blog: http://fergdawg.blogspot.com/



Re: [ok] Re: WMF patch

2006-01-04 Thread Fred Heutte

I understand the frustration Valdis has with the Microsoft situation.
I've done my share of patching and updating and crawling under
desks and wrestling with Exchange Server and all the rest,
and fortunately (for my sanity) I'm not managing a few dozen
M$ desktops anymore.

My observation had more to do with the posturing of the "security"
vendors (anti-virus, firewall, IDS, etc.) and the broad range of
highly important experts who are all clamoring for attention on
this and on all the other everyday security issues out there.
There is certainly a need for security services and products and
activities, but I am just not enamored of the "security mindset."
This is just a part of what our job is so let's get on with it. 

And if we can convince the PHBs that moving off of Windows is
(1) feasible, which is obvious; (2) manageable for them, which is
not so clear, so much the better.  I've broken my hammer pounding
this particular nail, so having failed at moving management away
from Windows, I moved myself away from management.

Fred



Re: WMF patch

2006-01-04 Thread Valdis . Kletnieks
On Wed, 04 Jan 2006 13:36:53 PST, Fred Heutte said:

> In my reading this is a serious vulnerability, but the self-
> inflating agitation in the "security community" has reached 
> a highly annoying level.  I'm in the FTDT (fix the damn thing)
> school; let's deal with it and get on with it.  Every cycle spent 
> moaning about the faults of Microsoft is a lost opportunity 
> for something more productive.

How many times do you propose we FTDT before we get fed up and ask upper
management to authorize a migration to some other software with a better
record? And how many more FTDT's do we need to tolerate while we wait for
upper management to authorize a migration?

Or to put it differently - if you discovered that your router vendor was
vulnerable because they had a proprietary BGP extension *designed* to deliver
arbitrary code for execution, would you FTDT, or would you be on the phone
with your vendor venting your outrage?  And what if it wasn't the first, but
more like the 10th year in a row that a similar design issue had surfaced?

Would you still just FTDT?

And while you're trying to figure out how to roll out a patch to 200 routers
that are totally under your control, keep in mind that a *small* organization
can have 30K PCs, not always totally managed.

Still feel like just FTDT?



pgpXqlH2YqtEh.pgp
Description: PGP signature


RE: WMF patch

2006-01-04 Thread Fred Heutte

More info.  This seems pretty reasonable:

http://castlecops.com/a6445-WMF_Exploit_FAQ.html

Steve Gibson is also mirroring Guilfanov's bypass, and says
Microsoft's cryptographically signed but unreleased patch
is floating around the net now:

http://www.grc.com/sn/notes-020.htm

In my reading this is a serious vulnerability, but the self-
inflating agitation in the "security community" has reached
a highly annoying level.  I'm in the FTDT (fix the damn thing)
school; let's deal with it and get on with it.  Every cycle spent
moaning about the faults of Microsoft is a lost opportunity
for something more productive.

Back to /usr/lurk . . .

regards,

Fred

-
>
>On Wed, 4 Jan 2006, Brance Amussen wrote:
>
>>
>> Howdy,
>> Here is the link to the unofficial patches creators site.
>> http://www.hexblog.com/ This is the one sans links to.
>> Sans seems to be having a hard day.. No Dshield mailings today either..
>> Isc.sans.org is sporadic as well..
>
>According to isc.sans.org, hexblog.com was down due to bandwidth issues
>earlier. See the isc.sans.org homepage for details on alternate ways to
>get to it.
>



RE: WMF patch

2006-01-04 Thread Sean Donelan

On Wed, 4 Jan 2006, Fergie wrote:
> Ilfak's server was overwhelmed -- the temporary 'path' is
> not being hosted by CastleCops:
>
>  http://www.castlecops.com/forums.html


Just explain to your users the difference between clicking on links on the
site and other "fix your PC links" on the page which are advertisments and
may or may not be as reputable depending on who buys the links tomorrow.




RE: WMF patch

2006-01-04 Thread Randy Bush

not true

since we're educating folk who don't read all the standard security lists
and blogs, ...

from sans some hours ago

lfak's site is back, reduced to the bare minimum as it had very
high load. If you still can't reach it's possible that there is
some caching between you/your ISP/Ilfak's site.

Thanks to Alexander H for pointing out that, due to changes on
Ilfak's site, URLs from old diary entries don't work
anymore. You can go to the main web page,
http://www.hexblog.com to access Ilfak's files.

Just one more update - if you can't access the site, the main
reason is that your DNS server(s) still don't have the updated
(new) DNS entries. Ilfak changed IP address of his site so it
will take a while for this to propagate. The new IP address is
216.227.222.95, and you can reach the site by going to
http://216.227.222.95.

randy



RE: WMF patch

2006-01-04 Thread Fergie

Ilfak's server was overwhelmed -- the temporary 'path' is
not being hosted by CastleCops:

 http://www.castlecops.com/forums.html

- ferg


-- Steve Sobol <[EMAIL PROTECTED]> wrote:

On Wed, 4 Jan 2006, Brance Amussen wrote:

> 
> Howdy, 
> Here is the link to the unofficial patches creators site.
> http://www.hexblog.com/ This is the one sans links to. 
> Sans seems to be having a hard day.. No Dshield mailings today either..
> Isc.sans.org is sporadic as well.. 

According to isc.sans.org, hexblog.com was down due to bandwidth issues 
earlier. See the isc.sans.org homepage for details on alternate ways to 
get to it.

-- 
Steve Sobol, Professional Geek   888-480-4638   PGP: 0xE3AE35ED
Company website: http://JustThe.net/
Personal blog, resume, portfolio: http://SteveSobol.com/
E: [EMAIL PROTECTED] Snail: 22674 Motnocab Road, Apple Valley, CA 92307


--
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 [EMAIL PROTECTED] or [EMAIL PROTECTED]
 ferg's tech blog: http://fergdawg.blogspot.com/



RE: WMF patch

2006-01-04 Thread Steve Sobol

On Wed, 4 Jan 2006, Brance Amussen wrote:

> 
> Howdy, 
> Here is the link to the unofficial patches creators site.
> http://www.hexblog.com/ This is the one sans links to. 
> Sans seems to be having a hard day.. No Dshield mailings today either..
> Isc.sans.org is sporadic as well.. 

According to isc.sans.org, hexblog.com was down due to bandwidth issues 
earlier. See the isc.sans.org homepage for details on alternate ways to 
get to it.

-- 
Steve Sobol, Professional Geek   888-480-4638   PGP: 0xE3AE35ED
Company website: http://JustThe.net/
Personal blog, resume, portfolio: http://SteveSobol.com/
E: [EMAIL PROTECTED] Snail: 22674 Motnocab Road, Apple Valley, CA 92307




RE: WMF patch

2006-01-04 Thread Brance Amussen

Howdy, 
Here is the link to the unofficial patches creators site.
http://www.hexblog.com/ This is the one sans links to. 
Sans seems to be having a hard day.. No Dshield mailings today either..
Isc.sans.org is sporadic as well.. 

Brance :)_S
 

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Eric
Frazier
Sent: Wednesday, January 04, 2006 11:15 AM
To: [EMAIL PROTECTED]
Subject: WMF patch


Hi,

I finally decided this was serious enough to do something about it sooner
than the MS patch, but while this seems to be the official link to the SANS
patch http://isc1.sans.org/diary.php?storyid=1010
it also is timing out. I have seen a couple of other links from googling to
people who have "repackaged" this, but I really don't want to download
something that doesn't match the SANS MD5..

Any links or suggestions?

Thanks,

Eric