Microsoft 'wmf' Patch Today - 1/5/06

Recommended Posts

Title: Microsoft Security Response Center Bulletin Notification

Issued: January 05, 2006




Important Information for Thursday 5 January 2006

Microsoft announced that it would release a security update to help

protect customers from exploitations of a vulnerability in the

Windows Meta File (WMF) area of code in the Windows operating system

on Tuesday, January 2, 2006, in response to malicious and criminal

attacks on computer users that were discovered last week.

Microsoft will release the update today on Thursday, January 5, 2006,

earlier than planned.

Microsoft originally planned to release the update on Tuesday,

January 10, 2006 as part of its regular monthly release of security

bulletins, once testing for quality and application compatibility

was complete. However, testing has been completed earlier than

anticipated and the update is ready for release.

In addition, Microsoft is releasing the update early in response to

strong customer sentiment that the release should be made available

as soon as possible.

Microsoft's monitoring of attack data continues to indicate that the

attacks are limited and are being mitigated both by Microsoft's

efforts to shut down malicious Web sites and with up-to-date

signatures form anti-virus companies.

The security update will be available at 2:00 pm PT as MS06-001.

Enterprise customers who are using Windows Server Update Services

will receive the update automatically. In additional the update is

supported Microsoft Baseline Security Analyzer 2.0, Systems

Management Server, and Software Update Services. Enterprise

customers can also manually download the update from the Download


Microsoft will hold a special Web cast on Friday, January 6, 2006,

to provide technical details on the MS06-001 and to answer questions.

Registration details will be available at

Microsoft will also be releasing additional security updates on

Tuesday, January 10, 2006 as part of its regularly scheduled release

of security updates.

More Info: MS Security Alert»

Link to post
Share on other sites

Re: MS Patch for WMF Vulnerability Exploit

Published: 2006-01-05,

Last Updated: 2006-01-05 21:47:54 UTC by Marcus Sachs

If you have installed any of the earlier patches or workarounds, here is our recommendation for updating:

1. Reboot your system to clear any vulnerable files from memory

2. Download and apply the new patch

3. Reboot

4. Uninstall the unofficial patch, by using Add/Remove Programs on single systems. If you used msi to install the patch on multiple machines you can uninstall it with this:

msiexec.exe /X{E1CDC5B0-7AFB-11DA-8CD6-0800200C9A66} /qn

5. Re-register the .dll if you previously unregistered it (use the same command but without the "-u"):

regsvr32 %windir%\system32\shimgvw.dll

6. Reboot one more time just for good measure

Source:SANS Internet Storm Center«

Link to post
Share on other sites

Please also see:

Microsoft Security Bulletin «MS06-001»

Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution (912919)

Published: January 5, 2006

Version: 1.0

Manual Download available:

•Microsoft Windows 2000 Service Pack 4

•Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2

•Microsoft Windows XP Professional x64 Edition

•Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1

•Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems

•Microsoft Windows Server 2003 x64 Edition

Link to post
Share on other sites
This topic is now closed to further replies.