A critical new zero-day flaw involving Microsoft DirectShow’s processing of QuickTime content is under attack, Microsoft reported today.
The flaw in the quartz.dll processor in the DirectShow platform affects Windows XP, 2000, and Server 2003. Windows Vista, Server 2008, and Windows 7 are not affected. Crooks can go after the hole even if you have Apple’s QuickTime installed, according to Microsoft.
Also, while opening a malicious QuickTime file could trigger the flaw, it’s not required. According to a Microsoft post at its Security Response Center, “a browser-based vector is potentially accessible through any browser using media plug-ins that use DirectShow.” So a drive-by-download–which can execute an attack in the background if you simply visit a malicious page–may be possible.
The bad guys are already attacking this hole with “limited attacks,” Microsoft says, but if this is half as bad as it sounds, I’d expect such attacks to increase. While no patch is out yet, Microsoft has made a quick “Fix-It” option available to temporarily disable Windows parsing of QuickTime files.
To get the fix, visit this Microsoft support page and click the “Fix this problem” button under the “Enable workaround” heading. You’ll then download a file which, when run, will modify the Registry to protect against this flaw. Later, after Microsoft has released a patch to permanently fix the hole, you can click the “Disable workaround” link on the same page to reverse the change.
For more information, see Microsoft Security Advisory 971778, along with posts on the Microsoft Security Research & Defense and Microsoft Security Response Center blogs.