Download our in-depth report: The Ultimate Guide to IT Security VendorsThe Windows Metafile Format (WMF) flaw is not quite a zero-day exploit anymore, but it's not quite patched yet, either. Microsoft has completed the development of a security update to fix the WMF flaw, which appeared last week. However, the update is being tested for quality control and isn't going to be released until Tuesday, Jan. 10.
An attacker could take advantage of the flaw to execute arbitrary code on a vulnerable Windows XP and Windows 2003 system.
The exploit targets how IE handles pictures that are transmitted by malicious sites hosting the .wmf file. The flaw saw numerous variants and was reportedly being exploited in the wild. The WMF exploit also had been added to the popular Metasploit Framework, which could potentially also allow for easy execution.
The updated Microsoft advisory acknowledges that, though the vulnerability is "serious" and attacks are being attempted, "the scope of the attacks are not widespread."https://o1.qnsr.com/log/p.gif?;n=203;c=204650394;s=9477;x=7936;f=201801171506010;u=j;z=TIMESTAMP;a=20392931;e=iPart of the reason for the mitigation of the flaw's impact is the fact that the major antivirus companies have updated their virus signatures to prevent execution of the associated virus.
Microsoft's own Windows OneCare Live Beta also provides protection against the vulnerability.
In its updated advisory, Microsoft also addresses the reason it is taking Microsoft so long to issue a security update.