Attackers Target Microsoft Jpeg Flaw - InformationWeek
IoT
IoT
Software // Enterprise Applications
News
9/28/2004
04:14 PM
50%
50%
RELATED EVENTS
Building Security for the IoT
Nov 09, 2017
In this webcast, experts discuss the most effective approaches to securing Internet-enabled system ...Read More>>

Attackers Target Microsoft Jpeg Flaw

Some feel a more-sophisticated virus is nearing completion.

Attackers have posted a malicious Jpeg image file to Internet newsgroups that distribute pornography. The infected Jpeg file attempts to exploit a critical vulnerability Microsoft announced and issued a patch for on Sept. 14, in its MS04-028 security bulletin.

According to postings on the Internet security mailing list Bugtraq and Easynews Web portal, the infected Jpeg file was posted Monday. Users who download the file could allow attackers to take complete control of their systems.

Internet security information group Internet Storm Center issued an advisory saying the malicious file appears to have been developed using one of the many published "exploit kits" that are designed to make it easier to attack the MS04-028 vulnerability.

The center tested the attack-image file on unpatched Windows 2000 and XP SP1 systems running Internet Explorer. It said that while the malicious file managed only to crash Internet Explorer, better attacks are likely on the way. "We suspect that a working exploit is very close to widespread availability," wrote the center's Joshua Wright in the advisory.

Most popular antivirus apps can detect and protect against this attack, and Microsoft is urging users to update their systems with the patch included in its MS04-028 security bulletin.

See all the latest Microsoft security bulletins.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
[Interop ITX 2017] State Of DevOps Report
[Interop ITX 2017] State Of DevOps Report
The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll