Linked by Thom Holwerda on Wed 4th Jan 2006 22:45 UTC
Windows The saga around the WMF flaw in Windows continues. "A cryptographically signed version of Microsoft's patch for the Windows Metafile vulnerability accidentally leaked onto the Internet late Tuesday, adding a new wrinkle to the company's round-the-clock efforts to stop the flow of malicious exploits. The MSRC (Microsoft Security Response Center) acknowledged that a slip-up caused 'a fast-track, pre-release version of the update' to be posted to a security community site and urged users to 'disregard' the premature update."
Thread beginning with comment 82003
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE: Important notice
by RenatoRam on Thu 5th Jan 2006 07:32 UTC in reply to "Important notice"
Member since:

Actually, unlike modern operating systems, windows DOES use the extension to know the format of an image. Try to rename a .jpg to .whatever and see by yourself.

The list of known extensions is in the registry; just search for it.

By the way, a known method of deception is using extensions with strings that windows will NEVER show you (they look like long alphanumeric strings in curly braces, just like the many weird registry keys). I read in the past that it is quite simple to produce a file that looks like a "file.doc" but is actually a "file.doc.{dfa43d35sljf3d53k2afd5jf35kldjfldjflk}" (whatever).
The next step is registering an handler for this weird file type... like "execute this", or "open in explorer", and your virus/worm is served.

Reply Parent Score: 1