<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="https://mg.to" xmlns:dc="https://purl.org/dc/elements/1.1/">
<channel>
 <title>mg.to - Worst Windows security flaw yet (updated) - Comments</title>
 <link>https://mg.to/2006/01/03/worst-windows-security-flaw-yet</link>
 <description>Comments for &quot;Worst Windows security flaw yet (updated)&quot;</description>
 <language>en</language>
<item>
 <title>Worst Windows security flaw yet (updated)</title>
 <link>https://mg.to/2006/01/03/worst-windows-security-flaw-yet</link>
 <description>&lt;p&gt;&lt;strong&gt;Update:&lt;/strong&gt; Microsoft has now released their &lt;a href=&quot;https://www.microsoft.com/technet/security/Bulletin/MS06-001.mspx&quot;&gt;official patch&lt;/a&gt; for the Windows Metafile security flaw. For detailed information, see the &lt;a href=&quot;https://isc.sans.org/diary.php?storyid=1019&quot;&gt;ISC report&lt;/a&gt;.&lt;/p&gt;

&lt;hr /&gt;

&lt;p&gt;(outdated content from 2006-01-03)&lt;/p&gt;

&lt;p&gt;In case you don&amp;#8217;t already know about it, the new Windows Metafile security flaw is a nasty one. Do not wait for the &lt;a href=&quot;https://www.microsoft.com/technet/security/advisory/912840.mspx&quot;&gt;Microsoft patch&lt;/a&gt; due next week. Protect your system now with Ilfak Guilfanov&amp;#8217;s &lt;a href=&quot;https://isc.sans.org/diary.php?storyid=999&quot;&gt;unofficial patch&lt;/a&gt;. After installing the patch, you can &lt;a href=&quot;https://isc.sans.org/diary.php?storyid=1006&quot;&gt;test your system&lt;/a&gt; to confirm that the bug is fixed. (Click on the Kevin Gennuso link on that page to open a .wmf file that attempts to start calc.exe. If you get a normal Windows Picture and Fax Viewer window instead of calc.exe, you are good to go.)&lt;/p&gt;

&lt;p&gt;After Microsoft&amp;#8217;s official patch is released, you can uninstall the unofficial patch.&lt;/p&gt;

&lt;p&gt;I didn&amp;#8217;t review the code for the unofficial patch, but people who did review it describe how it works in the &lt;a href=&quot;https://isc.sans.org/diary.php?storyid=994&quot;&gt;WMF FAQ&lt;/a&gt;. The patch works just the way I would have coded it myself.&lt;/p&gt;

&lt;p&gt;The FAQ also recommends unregistering shimgvw.dll in addition to the patch. I don&amp;#8217;t think this is necessary, but it wouldn&amp;#8217;t hurt.&lt;/p&gt;
</description>
 <comments>https://mg.to/2006/01/03/worst-windows-security-flaw-yet#comments</comments>
 <category domain="https://mg.to/topics/software/windows">Windows</category>
 <pubDate>Tue, 03 Jan 2006 04:18:02 +0000</pubDate>
 <dc:creator>Michael Geary</dc:creator>
 <guid isPermaLink="false">120 at https://mg.to</guid>
</item>
</channel>
</rss>
