http://www.acmenews.com/wmf.html
not say for 100% positive, due to legal liability reasons. But it sure
does look like they have.
If you don't trust me - wget the document - as it's mostly in plain
text.
That's still not necessarily safe.
I have seen reports that even just downloading the file with wget could
result in a user being infected. The reason is because anyone with the
Google Desktop installed will have it try to index all files and the
moment that the file is downloaded and Google Desktop attempts to index
it ... ZAP! ... the user's computer is infected.
http://www.f-secure.com/weblog/archives/archive-122005.html
[snip]
: iframecash - don't visit the site We got several questions on our note
: on Google Desktop yesterday. Bottom line is that if an image file with
: the exploit ends up to your hard drive, Google Desktop will try to
: index it and will execute the exploit in the process. There are
: several ways such a file could end up to the local drive. And this
: indexing-will-execute problem might happen with other desktop search
: engines too.
[snip]
: Do note that it's really easy to get burned by this exploit if you're
: analysing it under Windows. All you need to do is to access an
: infected web site with IE or view a folder with infected files with
: the Windows Explorer.
:
: You can get burned even while working in a DOS box! This happened on
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
: one of our test machines where we simply used the WGET command-line
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
: tool to download a malicious WMF file. That's it, it was enough to
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
: download the file. So how on earth did it have a chance to execute?
^^^^^^^^^^^^^^^^^^
: Google desktop
: The test machine had Google Desktop installed. It seems that Google
: Desktop creates an index of the metadata of all images too, and it
: issues an API call to the vulnerable Windows component SHIMGVW.DLL to
: extract this info. This is enough to invoke the exploit and infect the
: machine. This all happens in realtime as Google Desktop contains a
: file system filter and will index new files in realtime.
:
: So, be careful out there. And disable indexing of media files (or get
: rid of Google Desktop) if you're handling infected files under
: Windows.
[snip]