Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations strongm on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

VSE 8.0 Behavior Rules for WMF Exploit??

Status
Not open for further replies.

addus5

Technical User
Jun 20, 2003
112
US
Anyone know of any Behavior rules that will successfully warn or block the WMF exploit? Ive got a call into mcafee to see if they reccommend anything. My first thoughts would be to warn if gdi32.dll trys to execute anything. If im correct gdi32.dll uses the escape call the executes the code. Im not sure if gdi32.dll needs to execute or just needs read access to function properly.

Ideas?
 
I would have thought the McAfee DAT files would detect the WMF exploit files? If not the DAT files, wouldn't the Buffer Overflow Protection detect it?

If not, then please do post any Behavior Rules that would help stop the WMF exploit.

Thanks!
 
The DAT's detect some of the variants. The exploit doesnt use a Buffer Overflow. It uses an escape call in the GDI (
Mcafee says no to the behavior blocking but I dont buy it. I dont have a test lab but I emailed ISC and CERT to look into some more.

We are going to load a bullet into the gun by packaging the unofficial patch for deployment. If we see virus activity we will pull the trigger and deploy the patch and an Extra.DAT as needed.
 
I have not tested and/or verified this, but according to McAfee's web site, Buffer Overflow Protection should detect it when the malicious file is opened in Internet Explorer or Windows Explorer.


I don't know the full details of the WMF exploit so it may be possible that the Buffer Overflow protection doesn't cover all aspects of exploitation.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top