A patch for the “Windows image-file 0-day exploit” has been released

Ilfak Guilfanov has released a patch for the Windows metafile exploit that was reported last week. Technically the patch works by intercepting the calls to the user32.dll that causes the exploit to work. More information can be found at the beforementioned link.

While the patch isn’t released by Microsoft and since I have no prior knowledge of Ilfak Guilfanov I have chosen to install the patch anyway since it has been vouched for by Steve Gibson (of the Security Now! podcast) who I trust. Steves comments to the patch can be found at his website.

Please note: I had to reregister the DLL (“regsvr32 shimgvw.dll”) that I had previously unregistered to avoid the exploit before installing the patch.

Published by

lekkim

Positive, competent, out-spoken, frank and customer focused architect and developer with a strong foundation in web, cloud and product development. I'm a strong advocate for API first and cloud based solutions and development. I have a knack for being able to communicate and present technically complicated matters in conference, customer and training settings. I've previously acted as team member and leader in a product organisation.