Malicious code that can take advantage of a newly disclosed hole in Microsoft's MSN Messenger instant messenger program has been published on the internet. The publication of the code could set the stage for a possibly virulent IM worm or virus, according to security experts.
The code attacks a hole in an MSN Messenger component called libpng which is used to display PNG files that show smiley faces, buddy icons and other graphics. More than one example of code to exploit the hole was available on the internet this week, along with directions on how to use it to attack vulnerable Messenger applications. The code can cause Messenger to crash, or allow a remote attacker to run code on vulnerable Windows machines, according to a Vulnerability Alert released by Symantec.
On Tuesday, Microsoft released a patch, MS05-009, that fixed several holes in libpng for the PNG hole and labelled the vulnerability "critical".
The vulnerability is in a component of Messenger that is used to render PNG format image files that are used for display icons, also referred to as avatars. When a Messenger user initiates a conversation with an IM contact, the avatar image is transmitted over the same communication channel used to exchange text messages. By sending a specially crafted PNG image, an attacker can trigger a buffer overflow and execute arbitrary code on the chat partner's system, according to Max Caceres, director of product management at Core Security Technologies.
Researchers at Core Security discovered the hole and reported it to Microsoft in August, he says.
In buffer overflow attacks, malicious hackers flood temporary data storage areas on a computer with more information than they were intended to hold. Extra information, such as attack code, overflows into other areas of the computer's memory, overwriting other data and causing the system to crash or begin running the attacker's code.
"It's a very serious vulnerability. If you're a Messenger user, anyone on the network can take control of your machine without you knowing about it," Caceres says.
One example of exploit code, published on the website of K-OTik Security, affects MSN Messenger 6.2 and works on Windows 2000 and Windows XP systems that are running vulnerable versions of MSN Messenger. The exploit code could be used by a remote attacker to download a Trojan horse program or other malicious code to vulnerable systems, according to its author, who goes by the online name ATmaCA.
MSN Messenger beta version 6.2.7 is not affected, says Stephen Toulouse, security programme manager at Microsoft's Security Response Centre.
IM worms are not uncommon, but none have caused as much damage or gained the notoriety as the more common email worms such as MyDoom, Sobig or Blaster. However, experts have long warned that the potential exists for virulent, IM-borne threats.
IM networks are an example of a phenomenon known as scale-free networks. Epidemiologists use this term to describe systems, including communities of animals or people, in which not all members are connected to each other, but are highly susceptible to virus infections, according to research from Hewlett-Packard and presented at the Virus Bulletin Conference in October. Just a few users connected to popular instant messaging networks can cause worms to spread very rapidly, outpacing traditional signature-based protections offered by antivirus software.
MSN Messenger users are advised to download and install the MS05-009 patch as soon as possible to fix the PNG vulnerability, Toulouse says.