Security Researchers Say Windows .ANI Problem Surfaced Two Years Ago
The Windows .ANI bug that has plagued users for the past week is nearly the exact same problem Microsoft had to patch two years ago, security experts say.
Security researchers say the Windows .ANI bug that has been plaguing users for the past week first surfaced -- and was patched -- in early 2005.
Microsoft, however, says the .ANI vulnerability found this year is different from the one found years ago. But some security experts say it's the same mistake in the same process, and they're questioning how Microsoft could have missed it.
"If they had simply looked for other references for the same piece of code when they originally dealt with it a few years ago, they would have found this and patched it in 2005," said Craig Schmugar, a threat researcher with McAfee. "It would have saved a whole lot of people a lot of time, money, and effort."
Microsoft declined a telephone interview for this story, but a spokesman did e-mail InformationWeek to say that while the two vulnerabilities are both related to cursor and icon format handling, each vulnerability is unique.
The .ANI vulnerability involves the way Windows handles animated cursor files. It's a buffer overflow problem. The flaw, which affects all recent Windows releases, including Windows Vista, could enable a hacker to remotely take control of an infected system. Internet Explorer is the main attack vector for the exploits. Researchers concluded this week that Mozilla's open source browser Firefox also is at risk, though exploits haven't been focusing on it.
While Determina researchers had alerted Microsoft about the current vulnerability in December, the company still hadn't pulled together a patch for it before the exploits came out more than three months later. Once the exploits hit toward the end of March, Microsoft said it had nearly 100 technicians working around the clock for several days to get an emergency patch ready. It was shipped April 3.
Security researchers say the release of a patch won't stop the exploits. It won't even slow them down. In just a matter of days, analysts at Websense, a security company, found more than 700 Web sites that are spreading the .ANI exploit. Researchers also have found an exploit being sent out in a spam campaign that was luring users to malicious Web sites with promises of pictures of a naked Britney Spears. Automated toolkits began popping up online to let even lesser hackers build their own exploit malware.
Researchers at eEye Digital Security found a .ANI flaw in Microsoft's Windows back in 2004 and reported it to the company, said Andre Protas, a director at eEye, in an interview. Microsoft released a patch for it on Jan. 11, 2005.
Like today, that .ANI bug resulted in a lot of exploits and trouble for IT managers. McAfee's Schmugar said the .ANI exploits spent quite a bit of time in his company's top-five exploit list. The exploits, then as today, were transport mechanisms for a variety of malware that infected users' computers.
Building A Mobile Business MindsetAmong 688 respondents, 46% have deployed mobile apps, with an additional 24% planning to in the next year. Soon all apps will look like mobile apps – and it's past time for those with no plans to get cracking.
InformationWeek Must Reads Oct. 21, 2014InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.