Microsoft Graphics Rendering Engine Remote Code Execution Vulnerability
Overview: A remote code execution vulnerability exists in the rendering of Windows Metafile (WMF) and Enhanced Metafile (EMF) image formats that could allow remote code execution on an affected system. An attacker who successfully exploits this vulnerability can take complete control over an affected system.
WMF and EMF are graphic file formats used to display images.
This vulnerability has been classified as "High Risk." Computer users should take appropriate action to patch vulnerable systems.
Date Published: November 8, 2005
Date Last Revised : November 8, 2005
Impact: This vulnerability enables an attacker to execute code on the target system with elevated privileges. The vulnerability could be exploited on the affected systems by an attacker who persuaded a user to open a specially crafted file or to view a folder that contains the specially crafted image. There is no way for an attacker to force a user to open a specially crafted file, except potentially through previewing an email message. An attack that is successfully exploited would enable an attacker to install malicious code (worm, virus, Trojan horse), read confidential data, or take control over the target system.
Platforms Affected :
Please review the Microsoft Security Bulletin MS05-053 for a complete list of affected platforms: http://www.microsoft.com/technet/security/bulletin/MS05-053.mspx
Zone Labs Products:
To ensure the most comprehensive protection, computer users should employ ZoneAlarm® Security Suite, or ZoneAlarm Pro. Zone Labs products are not vulnerable to this attack.
All Zone Labs security products, including ZoneAlarm, protect the user's system from unauthorized access and intrusions, and alert the user when malicious code attempts to access the network.
ZoneAlarm Pro and ZoneAlarm Security Suite protect your system against this vulnerability through "Internet Zone Security" and "Trusted Zone Security".
It is recommended that you ensure the following:
- Internet Zone Security is set to High.
- Trusted Zone Security is set to Medium.
- Only trusted hosts are in the ‘Trusted' Zone.
- Block both inbound and outbound *.wmf and *.emf emails using E-Mail Protection.
- Avoid viewing “non-trusted” media files.
Contact : Zone Labs customers who are concerned about information contained in this advisory or have additional technical questions may reach our Technical Support team at: http://www.zonelabs.com/support/ . To report security issues with Zone Labs products contact firstname.lastname@example.org .
Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. Zone Labs and Zone Labs products, are registered trademarks of Zone Labs Incorporated and/or affiliated companies in the United States and other countries. All other registered and unregistered trademarks represented in this document are the sole property of their respective companies/owners.
Copyright: ©2005 Zone Labs LLC All rights reserved. Zone Labs, TrueVector, ZoneAlarm, and Cooperative Enforcement are registered trademarks of Zone Labs LLC The Zone Labs logo, Check Point Integrity and IMsecure are trademarks of Zone Labs, LLC. Check Point Integrity protected under U.S. Patent No. 5,987,611. Reg. U.S. Pat. & TM Off. Cooperative Enforcement is a service mark of Zone Labs LLC All other trademarks are the property of their respective owners.
Any reproduction of this alert other than as an unmodified copy of this file requires authorization from Zone Labs. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Zone Labs LLC.