Bugs and Fixes: Windows Flaw Makes Surfing Riskier

Today's Best Tech Deals

Picked by PCWorld's Editors

Top Deals On Great Products

Picked by Techconnect's Editors

Illustration: Joyce Hesselberth
Attackers have been using increasingly novel means to break into Windows systems--for example, using doctored media files like music, Web graphics, and video. Now joining that roster of dirty tricks are booby-trapped text fonts embedded in Web pages.

The bug sleuths at eEye Digital Security found a way to breach Windows' security by exploiting a flaw in how the OS displays text on Web sites. Web designers often use embedded fonts to guarantee that the text on a page will look the same in every browser.

All a cyberthug has to do is create a corrupted font on a Web site and wait for unsuspecting visitors. When you view the affected font in Internet Explorer--or in any application that uses Windows to show the fonts in question--the doctored text triggers a buffer overflow, disabling your PC's security and allowing the thug to then take control of your computer. Reading or even just previewing an affected HTML e-mail message in Outlook or Outlook Express can launch the attack too.

This flaw affects all versions of Windows, from Windows 98 through XP Service Pack 2, which means the majority of people online are potentially at risk. Microsoft has distributed the patch via Windows Update. You can also get it here.

The discovery follows a recent rash of attacks that exploited holes in the way Windows displays certain types of images embedded in Web pages. Smart crackers figured out how to use what are called Windows Metafile (WMF) images to disable a PC's security. (For details, see last month's column.)

More than ever, it pays to be careful what you click. These new vulnerabilities are especially troubling because you can compromise your system just by looking at a poisoned e-mail message or Web page.

Block Outlook Hole

A separate vulnerability affecting Outlook 2000, XP, or 2003 users may give a hacker control of your machine as well. Again, you simply have to open or preview a doctored e-mail to be compromised. Outlook's mishandling of a file format called Transport Neutral Encapsulation, or TNEF, is to blame. The problem is "critical" in Microsoft's eyes because the application uses TNEF when it sends or receives e-mail in the commonly used Rich Text Format.

As before, you can run Windows Update to get this patch; you can also download it here.

In Brief

Winamp Danger:If you open a specially crafted playlist (from a link on a malicious Web site, for example) with version 5.12 of Winamp, you'll end up with a buffer overflow error that could let the bad guys take over your PC. To get the fix, you need to upgrade to version 5.13 or later (go here).

Microsoft Small Biz Accounting Glitch:If Microsoft Office Small Business Accounting 2006 gives a nondescript error and crashes every time you start it, reinstall the program's Service Pack 1. Find out more from Microsoft here.

1 2 Page 1
Page 1 of 2
Shop Tech Products at Amazon