Windows metafile vulnerability

Discussion in 'Royal Signals' started by Disco, Dec 29, 2005.

Welcome to the Army Rumour Service, ARRSE

The UK's largest and busiest UNofficial military website.

The heart of the site is the forum area, including:

  1. Some use untill the patch becomes available

    SOURCE

    Microsoft and CERT.ORG have issued bulletins on the Windows Metafile vulnerability:
    http://www.microsoft.com/technet/security/advisory/912840.mspx
    http://www.kb.cert.org/vuls/id/181038

    Microsoft's bulletin confirms that this vulnerability applies to all the main versions of Windows: Windows ME, Windows 2000, Windows XP and Windows 2003.

    They also list the REGSVR32 workaround. It's a good idea to use this while waiting for a patch. To quote Microsoft's bulletin:

    Un-register the Windows Picture and Fax Viewer (Shimgvw.dll)

    1. Click Start, click Run, type "regsvr32 -u %windir%\system32\shimgvw.dll"
    (without the quotation marks), and then click OK.

    2. A dialog box appears to confirm that the un-registration process has succeeded.
    Click OK to close the dialog box.

    Impact of Workaround: The Windows Picture and Fax Viewer will no longer be started
    when users click on a link to an image type that is associated with the Windows Picture and Fax Viewer.

    To undo this change, re-register Shimgvw.dll by following the above steps.
    Replace the text in Step 1 with “regsvr32 %windir%\system32\shimgvw.dll” (without the quotation marks).
     
  2. If you are opperating your PC as Admin, you should deserve everything you get.
     
  3. Tried to re-register shimgvw as desribed above and got blown out. Layer 7 is not my bag baby. Any one got any ideas ?
     
  4. Cancel my last I am obviously pot IS Engr material as I have sorted it!
     
  5. I solved my problem by logging on as Admin and doing it ! (Yes Arrse indeed, but honest)