Microsoft Readies WMF Patch
Page 1 of 1
The Windows Metafile Format (WMF) flaw is not quite a zero-day exploit anymore, but it's not quite patched yet, either.
Microsoft has completed the development of a security update to fix the WMF flaw, which appeared last week. However, the update is being tested for quality control and isn't going to be released until Tuesday, Jan. 10.
An attacker could take advantage of the flaw to execute arbitrary code on a vulnerable Windows XP and Windows 2003 system.
The exploit targets how IE handles pictures that are transmitted by malicious sites hosting the .wmf file. The flaw saw numerous variants and was reportedly being exploited in the wild. The WMF exploit also had been added to the popular Metasploit Framework, which could potentially also allow for easy execution.
The updated Microsoft advisory acknowledges that, though the vulnerability is "serious" and attacks are being attempted, "the scope of the attacks are not widespread."
Part of the reason for the mitigation of the flaw's impact is the fact that the major antivirus companies have updated their virus signatures to prevent execution of the associated virus.
Microsoft's own Windows OneCare Live Beta also provides protection against the vulnerability.
In its updated advisory, Microsoft also addresses the reason it is taking Microsoft so long to issue a security update.
"Creating security updates that effectively fix vulnerabilities is an extensive process," the advisory states.
The advisory explains that Microsoft security personnel spend time to investigate the severity of the vulnerability, as well as its impact on applications. Updates are developed for every supported version of the supported product, localized for 23 languages and then issued simultaneously worldwide.