Welcome to MalwareRemoval.com,
What if we told you that you could get malware removal help from experts, and that it was 100% free? MalwareRemoval.com provides free support for people with infected computers. Our help, and the tools we use are always 100% free. No hidden catch. We simply enjoy helping others. You enjoy a clean, safe computer.

Malware Removal Instructions

Microsoft 'WMF' Patch today @ 2:00 PT - 1/05/2006

Notifications for Security Updates, as well as News and Information from across the web - mostly security minded.

Update Contributors: Members of the Malware Removal University.

Regular Members: Our Regular Members are invited to start and/or participate in all other topics. Join in and share the news that's important to you.

Microsoft 'WMF' Patch today @ 2:00 PT - 1/05/2006

Unread postby Chachazz » January 5th, 2006, 5:05 pm

Title: Microsoft Security Response Center Bulletin Notification
Issued: January 05, 2006
********************************************************************

Summary
=======
Important Information for Thursday 5 January 2006

Microsoft announced that it would release a security update to help
protect customers from exploitations of a vulnerability in the
Windows Meta File (WMF) area of code in the Windows operating system
on Tuesday, January 2, 2006, in response to malicious and criminal
attacks on computer users that were discovered last week.

Microsoft will release the update today on Thursday, January 5, 2006,
earlier than planned.


Microsoft originally planned to release the update on Tuesday,
January 10, 2006 as part of its regular monthly release of security
bulletins, once testing for quality and application compatibility
was complete. However, testing has been completed earlier than
anticipated and the update is ready for release.

In addition, Microsoft is releasing the update early in response to
strong customer sentiment that the release should be made available
as soon as possible.

Microsoft's monitoring of attack data continues to indicate that the
attacks are limited and are being mitigated both by Microsoft's
efforts to shut down malicious Web sites and with up-to-date
signatures form anti-virus companies.

The security update will be available at 2:00 pm PT as MS06-001.

Enterprise customers who are using Windows Server Update Services
will receive the update automatically. In additional the update is
supported Microsoft Baseline Security Analyzer 2.0, Systems
Management Server, and Software Update Services. Enterprise
customers can also manually download the update from the Download
Center.

Microsoft will hold a special Web cast on Friday, January 6, 2006,
to provide technical details on the MS06-001 and to answer questions.
Registration details will be available at
http://www.microsoft.com/technet/security/default.mspx.

Microsoft will also be releasing additional security updates on
Tuesday, January 10, 2006
as part of its regularly scheduled release
of security updates.

More Info: MS Security Notification»
Last edited by Chachazz on April 9th, 2006, 3:59 pm, edited 1 time in total.
User avatar
Chachazz
Regular Member
 
Posts: 642
Joined: July 3rd, 2005, 5:33 pm
Location: Canada
Advertisement
Register to Remove

Unread postby Chachazz » January 5th, 2006, 6:11 pm

Re: MS Patch for WMF Vulnerability Exploit
Published: 2006-01-05,
Last Updated: 2006-01-05 21:47:54 UTC by Marcus Sachs
If you have installed any of the earlier patches or workarounds, here is our recommendation for updating:

1. Reboot your system to clear any vulnerable files from memory
2. Download and apply the new patch
3. Reboot
4. Uninstall the unofficial patch, by using Add/Remove Programs on single systems. If you used msi to install the patch on multiple machines you can uninstall it with this:
msiexec.exe /X{E1CDC5B0-7AFB-11DA-8CD6-0800200C9A66} /qn
5. Re-register the .dll if you previously unregistered it (use the same command but without the "-u"):
regsvr32 %windir%\system32\shimgvw.dll
6. Reboot one more time just for good measure

Source:SANS Internet Storm Center»
User avatar
Chachazz
Regular Member
 
Posts: 642
Joined: July 3rd, 2005, 5:33 pm
Location: Canada

Unread postby Chachazz » January 5th, 2006, 10:08 pm

Please also see:

Microsoft Security Bulletin «MS06-001»
Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution (912919)
Published: January 5, 2006
Version: 1.0

Manual Download available:
•Microsoft Windows 2000 Service Pack 4
•Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
•Microsoft Windows XP Professional x64 Edition
•Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1
•Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
•Microsoft Windows Server 2003 x64 Edition
User avatar
Chachazz
Regular Member
 
Posts: 642
Joined: July 3rd, 2005, 5:33 pm
Location: Canada


Return to News Desk



Who is online

Users browsing this forum: No registered users and 106 guests

Contact us:

Advertisements do not imply our endorsement of that product or service. Register to remove all ads. The forum is run by volunteers who donate their time and expertise. We make every attempt to ensure that the help and advice posted is accurate and will not cause harm to your computer. However, we do not guarantee that they are accurate and they are to be used at your own risk. All trademarks are the property of their respective owners.

Member site: UNITE Against Malware