Skip to content
View in the app

A better way to browse. Learn more.

Thailand News and Discussion Forum | ASEANNOW

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

Nasty New Windows Security Vulnerability Found

Featured Replies

For information:

A new vulnerability in Windows, that is being actively exploited on the web to install malware into innocent users' machines, has been discovered. (Over 1000 websites (porno, warez, etc) have already been identified.)

This vulnerability involves buffer overflow in the Vector Markup Language (VML) library file used by Microsoft Internet Explorer and Outlook. A buffer overflow in the Microsoft Vector Graphics Rendering (VML) engine (filename: VGX.DLL) allows remote code execution.

Microsoft has acknowledged this problem and expects to have a patch by October 10th. :o

A reputable group known as "ZERT" — Zeroday Emergency Response Team — has produced a GUI and Command Line patch utility which repairs the VML buffer overrun design flaw in Microsoft's VGX.DLL file.

Since VML is rarely used on the web, "unregistering" the vulnerable DLL to take it completely out of service is probably the best countermeasure. However, if you choose to unregister the DLL you will need to remember to re-register it later, once Microsoft has released a formal "fix".

More Info:

http://www.microsoft.com/technet/security/...ory/925568.mspx

http://www.grc.com/sn/notes-058.htm

http://securityresponse.symantec.com/avcen...tent/20096.html

Vulnerability Test and Workaround Patch:

http://isotf.org/zert/download.htm

waldwolf

PS - While the use of other browsers, such as Firefox, offer greater protection, you could still become infected via email if you use Microsoft's Outlook, as Outlook also utilizes the Internet Explorer engine.

.

For information:

A new vulnerability in Windows, that is being actively exploited on the web to install malware into innocent users' machines, has been discovered. (Over 1000 websites (porno, warez, etc) have already been identified.)

This vulnerability involves buffer overflow in the Vector Markup Language (VML) library file used by Microsoft Internet Explorer and Outlook. A buffer overflow in the Microsoft Vector Graphics Rendering (VML) engine (filename: VGX.DLL) allows remote code execution.

Microsoft has acknowledged this problem and expects to have a patch by October 10th. :D

A reputable group known as "ZERT" — Zeroday Emergency Response Team — has produced a GUI and Command Line patch utility which repairs the VML buffer overrun design flaw in Microsoft's VGX.DLL file.

Since VML is rarely used on the web, "unregistering" the vulnerable DLL to take it completely out of service is probably the best countermeasure. However, if you choose to unregister the DLL you will need to remember to re-register it later, once Microsoft has released a formal "fix".

More Info:

http://www.microsoft.com/technet/security/...ory/925568.mspx

http://www.grc.com/sn/notes-058.htm

http://securityresponse.symantec.com/avcen...tent/20096.html

Vulnerability Test and Workaround Patch:

http://isotf.org/zert/download.htm

waldwolf

PS - While the use of other browsers, such as Firefox, offer greater protection, you could still become infected via email if you use Microsoft's Outlook, as Outlook also utilizes the Internet Explorer engine.

.

this is yet another reason to use firefox and thunderbird in place of microsh#te version that has more vunerabilities than a drunk and drugged up rich farang in a russian mafia owned whorehouse :o

no offence to russia or girl rental outlets

IE has too many known vulnerabilities like this, and they've been around for a *long* time. Tons of websites exploit these weaknesses.

As I've said before, if you don't want virii, malware, and spyware on your computer, one of the best preventive measures is to STOP USING IE.

I'm amazed that so many people still use IE. It's not just risky, its also CRAP! I just cringe when I use it now. Urgh...

  • Author

Firefox/Thunderbird users should be aware they are not totally immune from malware attack.

Reference:

http://www.mozilla.org/security/announce/2...fsa2006-44.html

http://www.mozilla.org/security/announce/2...fsa2006-63.html

Recently Addressed Threats:

http://www.mozilla.org/projects/security/k...es.html#Firefox

http://www.mozilla.org/projects/security/k...tml#Thunderbird

If you run Firefox/Thunderbird, and you have not already done so, it is strongly recommended you update both Firefox and Thunderbird to version 1.5.0.7 (released September 19, 2006).

waldwolf

.

Firefox and its ilk are not totally immune, but nothing really is. It's just the relative *level* of vulnerability is very different. Tons of websites target IE, while relatively few target other browsers. You could probably get a few hundred virii with IE during a week, but none with Firefox.

I'm amazed that so many people still use IE. It's not just risky, its also CRAP! I just cringe when I use it now. Urgh...
I mostly agree. I use Firefox about 99% of the time but there still remains the one percent of Web sites I occasionally visit (typically corporate ones) that still only work properly with IE. However, I would fully apply what you said, and more, to Outlook. Anyone who uses that for e-mail is quite simply a drooling, mouth breathing, ******.
I'm amazed that so many people still use IE. It's not just risky, its also CRAP! I just cringe when I use it now. Urgh...
I mostly agree. I use Firefox about 99% of the time but there still remains the one percent of Web sites I occasionally visit (typically corporate ones) that still only work properly with IE. However, I would fully apply what you said, and more, to Outlook. Anyone who uses that for e-mail is quite simply a drooling, mouth breathing, ******.

With Outlook Express I agree, but you must remember that in the business environment

there may be no choice except Outlook, if that is what your company specifies.

Microsoft Offers Early Fix for Critical IE Bug

Mounting problem forces software giant to release VML patch ahead of its monthly security update

IDG News Service

Tuesday, September 26, 2006 12:00 PM PDT

With attackers finding new ways to exploit a critical flaw in Internet Explorer, Microsoft today released a patch for the problem, ahead of its next scheduled round of security updates.

The patch fixes a critical vulnerability in the way Internet Explorer renders VML (Vector Markup Language) graphics. Hackers had been exploiting the flaw, which also link type="internal" src="/article/id,127229/article.html">affects some versions of Outlook, for more than a week, and in recent days malicious activity had been on the upswing. Microsoft Security Bulletin MS06-055 discusses the problem and the patch. The out-of-cycle release is unusual, but not unprecedented.

Microsoft generally releases its security updates on the second Tuesday of every month, giving system administrators a predictable way to set aside time to test the new software. Occasionally, the company will release patches ahead of time if a flaw is being widely exploited by attackers. In January, it patched a critical flaw in the Microsoft Windows Metafile (WMF) image-rendering engine after it became a widespread problem.

VML 'A Serious Concern'

With attack code that works on the latest version of Windows XP now publicly available, the VML bug is shaping up as a very serious concern for administrators, said Ken Dunham, the director of Verisign's iDefense Rapid Response Team. VML attacks have now "dwarfed the WMF activity in the same period of time compared to last year," he said.

By today, more than 3,000 Web sites were already infecting users with malware that exploited the VML bug, according to Dunham. One week into the WMF outbreak last January, iDefense saw about 600 sites exploiting the problem.

Security experts also warn that there are many variants of the VML malware, some of which may be missed by security software. Researchers at iDefense are now looking at a dozen possible variations of the VML exploit code and have confirmed the existence of seven variants, Dunham said. "With WMF there wasn't nearly as much modification. We see a lot of different permutations and obfuscation techniques being utilize with VML attacks."

A group of security researchers released a patch for the VML flaw late last week, independent of Microsoft, but criminals have even found a way to exploit the fix.

In the past few days they have been circulating phoney e-mails, claiming to be a patch for the VML problem. If downloaded, this fake patch actually installs malicious software on the victim's system, Dunham said. The increase in attacks put Microsoft on the spot to produce an early fix.

Microsoft's next regularly scheduled security updates will be released Oct. 10.

Create an account or sign in to comment

Recently Browsing 0

  • No registered users viewing this page.

Account

Navigation

Search

Search

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.