Exploit released for MSN Messenger 'avatar' hole

Code to exploit a hole in Microsoft's MSN Messenger IM application was published Wednesday, one day after Microsoft released a patch for the hole.

Malicious code that can take advantage of a newly disclosed hole in Microsoft's MSN Messenger instant messenger (IM) program has been published on the Internet. The publication of the code could set the stage for a possibly virulent IM worm or virus, according to security experts.

The code attacks a hole in an MSN Messenger component called "libpng," which is used to display PNG (Portable Network Graphics) files that are used to show smiley faces, buddy icons and other graphics. More than one example of code to exploit the hole was available on the Internet Wednesday, along with directions on how to use it to attack vulnerable Messenger applications. The code can cause Messenger to crash, or allow a remote attacker to run code on vulnerable Windows machines, according to a Vulnerability Alert released by Symantec.

On Tuesday, Microsoft released a patch, MS05-009, that fixed several holes in libpng for the PNG hole and labelled the vulnerability "critical." (See: http://www.microsoft.com/technet/security/bulletin/MS05-009.mspx.)

The vulnerability is in a component of Messenger that is used to render PNG format image files that are used for display icons, also referred to as "avatars." When a Messenger user initiates a conversation with an IM contact, the avatar image is transmitted over the same communication channel used to exchange text messages. By sending a specially crafted PNG image, an attacker can trigger a buffer overflow and execute arbitrary code on the chat partner's system, according to Max Caceres, director of product management at Core Security Technologies.

Researchers at Core Security discovered the hole and reported it to Microsoft in August, he said.

In buffer overflow attacks, malicious hackers flood temporary data storage areas on a computer with more information than they were intended to hold. Extra information, such as attack code, overflows into other areas of the computer's memory, overwriting other data and causing the system to crash or begin running the attacker's code.

"It's a very serious vulnerability. If you're a Messenger user, anyone on the (MSN Messenger) network can take control of your machine without you knowing about it," Caceres said.

One example of exploit code, published on the Web site of K-OTik Security, affects MSN Messenger 6.2 and works on Windows 2000 and Windows XP systems that are running vulnerable versions of MSN Messenger. The exploit code could be used by a remote attacker to download a Trojan horse program or other malicious code to vulnerable systems, according to its author, who goes by the online name ATmaCA. (See: http://www.k-otik.com/exploits/20050209.MS05009.c.php.)

MSN Messenger beta Version 6.2. 7. is not affected, said Stephen Toulouse, security program manager at Microsoft's Security Response Center.

IM worms are not uncommon, but none have caused as much damage or gained the notoriety as the more common e-mail worms, such as MyDoom, Sobig or Blaster. However, experts have long warned that the potential exists for virulent, IM-borne threats.

IM networks are an example of a phenomenon known as "scale-free networks." Epidemiologists use this term to describe systems, including communities of animals or people, in which not all members are connected to each other, but are highly susceptible to virus infections, according to research from Hewlett-Packard and presented at the Virus Bulletin Conference in October. Just a few users connected to popular instant messaging networks can cause worms to spread very rapidly, outpacing traditional signature-based protections offered by antivirus software.

MSN Messenger users are advised to download and install the MS05-009 patch as soon as possible to fix the PNG vulnerability, Toulouse said.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Paul Roberts

IDG News Service
Show Comments

Brand Post

Imou: At home with security

Modern living is all about functionality and security for everybody from the very young to the very old. With Imou anybody can enjoy smart life – the solution is at their fingertips.

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Ada Chan

Dynabook Portégé X30L-G

I highly recommend the Dynabook Portégé® X30L-G notebook for everyday business use, it is a benchmark setting notebook of its generation in the lightweight category.

Tom Sellers

MSI P65

This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang

MSI GT76

It really doesn’t get more “gaming laptop” than this.

Jack Jeffries

MSI GS75

As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr

MSI PS63

The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?