Microsoft Security Advisory (912840): Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution. http://www.microsoft.com/technet/security/advisory/912840.mspx
- SOFTWARE DATA EXECUTION PROTECTION:
There’s a real simple solution – Enable software DEP, a feature of Windows XP Service Pack 2. Here’s a quote from the advisory that no one seems to be reading.
"I have software DEP enabled on my system, does this help mitigate the vulnerability?
Yes. Windows XP Service Pack 2 also includes software-enforced DEP that is designed to reduce exploits of exception handling mechanisms in Windows. By default software-enforced DEP applies to core operating system components and services. This vulnerability can be mitigated by enabling DEP for all programs on your computer.
For additional information about how to “Enable DEP for all programs on your computer”, see the product documentation."To enable or mess around with the DEP settings:
– Go to START->CONTROL PANEL->SYSTEM
– Click ADVANCED tab & press Performance SETTINGS button
– Click DATA EXECUTION PROTECTION tab
Make sure that the "Turn on DEP for essential Windows programs and services only" radio button is clicked. - HARDWARE DATA EXECUTION PROTECTION:
This is an even easier solution. Enable hardware DEP support (also called NX support) on your PC if you have a recent Pentium 4 from Feb 2005 on, or an AMD Athlon chip.
(BTW If you have no idea what this is, check out http://www.updatexp.com/data-execution-prevention.html for a 3rd party explanation of what software and hardware DEP is.) - DISABLE OR UNREGISTER "SHIMGVW.DLL"
A couple of security firms, including Verisign’s iDefense, have published workarounds that appear to mitigate the threat. According to iDefense, Windows users can disable the rendering of WMF files using the following hack:1. Click on the Start button on the taskbar.
2. Click on Run…
3. Type "regsvr32 /u shimgvw.dll" to disable.
4. Click ok when the change dialog appears.iDefense notes that this workaround may interfere with certain thumbnail images loading correctly, though I have used the hack on my machine and haven’t had any problems yet. The company notes that once Microsoft issues a patch, the WMF feature may be enabled again by entering the command "regsvr32 shimgvw.dll" in step three above.
