Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

11/5/2013
03:14 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Microsoft Warns Of Zero-Day Attacks Exploiting TIFF

'Fix it' released for protection until patch is prepared

Targeted attacks exploiting a zero-day flaw in the Microsoft Graphics component have been spotted in the wild hitting victims in the Middle East and South Asia.

Microsoft says the newly discovered remote code execution vulnerability, CVE-2013-3096, can be exploited via a malformed TIFF image. "Microsoft is investigating private reports of a vulnerability in the Microsoft Graphics component that affects Microsoft Windows, Microsoft Office, and Microsoft Lync. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability in Microsoft Office products," the software company said in a security advisory issued today.

Bad guys can exploit the flaw that affects Windows, Office, and Lync by luring a victim into previewing or opening an email with a malicious file attachment or to visit a malicious URL. The end game is that the attacker can take over the machine. Microsoft has released a temporary Fix it patch for protection against attacks until it either issues a patch via its Patch Tuesday schedule or an out-of-band update.

"An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights," Microsoft says.

Microsoft says in the current attacks, the exploit requires a user to open the malicious Word attachment, which exploits the bug using a malicious TIFF image embedded in the document. The attack appears sophisticated in that it bypasses Microsoft's Data Execution Prevention and Address Space Layout Randomization mitigation defenses.

The flaw is in how Windows, Office, and Lync improperly handle "specially crafted" TIFF files, Microsoft says.

Users can install the temporary Fix it tool that blocks the attack, or employ Microsoft's Enhanced Mitigation Experience Toolkit (EMET), which can stop the attack, Elia Florio with Microsoft's Security Response Center engineering group said in a blog post today.

"The attacks observed are very limited and carefully carried out against selected computers, largely in the Middle East and South Asia," Florio wrote.

Wolfgang Kandek, CTO of Qualys, says the Fix it turns off TIFF rendering in the graphics library. "The listed software packages are not vulnerable under all conditions, so it is important that you take a look at your installed base and your possible exposure for the next couple of weeks into December," he advised in a blog post today. "Given the close date of the next Patch Tuesday for November, we don't believe that we can count on a patch arriving in time; we will probably have to wait until December, which makes your planning for a work-around even more important."

Microsoft's full security advisory on the new zero-day is here.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Tommy097
50%
50%
Tommy097,
User Rank: Apprentice
3/7/2014 | 7:35:44 AM
re: Microsoft Warns Of Zero-Day Attacks Exploiting TIFF
My work involves dealing with tiff a lot. Well I should have known better. Maybe it's time to swift to another format. I'm gonna convert them all to PDF.
http://www.yiigo.com/guides/vb...
cdansbee
50%
50%
cdansbee,
User Rank: Apprentice
11/6/2013 | 12:18:41 AM
re: Microsoft Warns Of Zero-Day Attacks Exploiting TIFF
Another example of guided cruise malware like Stuxnet???
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This is not what I meant by "I would like to share some desk space"
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-3686
PUBLISHED: 2021-01-21
Possible memory out of bound issue during music playback when an incorrect bit stream content is copied into array without checking the length of array in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobi...
CVE-2020-3687
PUBLISHED: 2021-01-21
Local privilege escalation in admin services in Windows environment can occur due to an arbitrary read issue in XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
CVE-2020-3691
PUBLISHED: 2021-01-21
Possible out of bound memory access in audio due to integer underflow while processing modified contents in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon We...
CVE-2020-11167
PUBLISHED: 2021-01-21
Memory corruption while calculating L2CAP packet length in reassembly logic when remote sends more data than expected in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Weara...
CVE-2020-11179
PUBLISHED: 2021-01-21
Arbitrary read and write to kernel addresses by temporarily overwriting ring buffer pointer and creating a race condition. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon ...