This HTML5 document contains 205 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dbthttp://dbpedia.org/resource/Template:
wikipedia-enhttp://en.wikipedia.org/wiki/
dbpedia-lmohttp://lmo.dbpedia.org/resource/
dbpedia-fihttp://fi.dbpedia.org/resource/
n15https://www.microsoft.com/athome/security/update/bulletins/
dbrhttp://dbpedia.org/resource/
n24http://www.f-secure.com/weblog/archives/
n31http://www.nod32.ch/en/download/
n44https://www.microsoft.com/technet/security/Bulletin/
n43https://www.washingtonpost.com/wp-dyn/content/article/2005/12/29/
n46https://www.microsoft.com/technet/security/advisory/
n39http://blogs.technet.com/msrc/archive/2006/01/13/
n29http://support.microsoft.com/kb/
dctermshttp://purl.org/dc/terms/
n17http://www.icewalkers.com/Linux/Software/5400/
n38http://msdn.microsoft.com/library/default.asp%3Furl=/library/en-us/gdi/
rdfshttp://www.w3.org/2000/01/rdf-schema#
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n30http://secunia.com/advisories/18255/
n25http://vil.mcafeesecurity.com/vil/content/
n47https://www.microsoft.com/technet/security/bulletin/
dbphttp://dbpedia.org/property/
n14http://www.hexblog.com/2005/12/
n41https://blogs.technet.microsoft.com/markrussinovich/2006/01/18/inside-the-wmf-backdoor/
xsdhhttp://www.w3.org/2001/XMLSchema#
n33http://www.node707.com/archives/
n32http://support.microsoft.com/
dbohttp://dbpedia.org/ontology/
n11http://blogs.securiteam.com/index.php/archives/
dbchttp://dbpedia.org/resource/Category:
n16http://isc.sans.org/
n4https://www.pcmag.com/article2/
yagohttp://dbpedia.org/class/yago/
n40http://www.metasploit.com/projects/Framework/
wikidatahttp://www.wikidata.org/entity/
n12https://global.dbpedia.org/id/
yago-reshttp://yago-knowledge.org/resource/
n28http://www.grc.com/wmf/
n48https://www.microsoft.com/technet/security/prodtech/windowsxp/
n19http://sunbeltblog.blogspot.com/2005/12/
provhttp://www.w3.org/ns/prov#
foafhttp://xmlns.com/foaf/0.1/
dbpedia-zhhttp://zh.dbpedia.org/resource/
n26http://it.slashdot.org/it/06/01/02/
n7http://www.hexblog.com/2006/01/
n20https://web.archive.org/web/20060317204854/http:/blogs.zdnet.com/Ou/
dbpedia-eshttp://es.dbpedia.org/resource/
freebasehttp://rdf.freebase.com/ns/
owlhttp://www.w3.org/2002/07/owl#

Statements

Subject Item
dbr:Pwnie_Awards
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:Metafile_image_code_execution
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
dbo:wikiPageRedirects
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:Defensive_programming
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:Windows_Metafile
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:Stephen_Toulouse
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:Steve_Gibson_(computer_programmer)
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:Wine_(software)
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:Drive-by_download
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:Internet_Storm_Center
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:Bifrost_(Trojan_horse)
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:Mark_Russinovich
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:Windows_Metafile_Vulnerability
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
dbo:wikiPageRedirects
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:Windows_metafile_vulnerability
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
dbo:wikiPageRedirects
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:Ilfak_Guilfanov
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:Windows_Metafile_vulnerability
rdf:type
yago:Window104587648 yago:SupportingStructure104361095 yago:PhysicalEntity100001930 yago:WikicatMicrosoftWindows yago:Structure104341686 yago:Object100002684 yago:Framework103391770 yago:Artifact100021939 yago:Whole100003553 yago:YagoPermanentlyLocatedEntity yago:YagoGeoEntity
rdfs:label
Windows Metafile vulnerability WMF文件格式漏洞 Vulnerabilidad del metarchivo de Windows
rdfs:comment
La vulnerabilidad del metarchivo de Windows, también llamada ejecución de código de imagen del metarchivo y abreviada MCE, es una vulnerabilidad de seguridad en la forma en que algunas versiones del sistema operativo Microsoft Windows manejan imágenes en el formato de metarchivo de Windows. Permite que se ejecute código arbitrario en las computadoras afectadas sin el permiso de sus usuarios. Fue descubierto el 27 de diciembre de 2005 y los primeros informes de las computadoras afectadas se anunciaron en 24 horas. Microsoft lanzó una actualización de alta prioridad para eliminar esta vulnerabilidad a través de Windows Update el 5 de enero de 2006. Los ataques que usan esta vulnerabilidad se conocen como vulnerabilidades de WMF. The Windows Metafile vulnerability—also called the Metafile Image Code Execution and abbreviated MICE—is a security vulnerability in the way some versions of the Microsoft Windows operating system handled images in the Windows Metafile format. It permits arbitrary code to be executed on affected computers without the permission of their users. It was discovered on December 27, 2006, and the first reports of affected computers were announced within 24 hours. Microsoft released a high-priority update to eliminate this vulnerability via Windows Update on January 5, 2007. Attacks using this vulnerability are known as WMF exploits. WMF文件格式漏洞是一个源于微软Windows操作系统的漏洞,被一个计算机安全邮件列表Bugtraq于2005年12月27日公开[1] (页面存档备份,存于互联网档案馆),在24小时内就成为一些恶意程序,例如间谍软件和木马程序的载体。 微软于1月6日发布了针对Windows 2000和Windows XP版本中不当处理WMF函数SETABORTPROC的补丁,并且在1月16日发布了针对Windows Vista的补丁,但是其他的操作系统仍旧会受到该漏洞的威胁。 该漏洞源于Windows的核心模块gdi32.dll处理WMF格式的方式,允许在计算机上不经过用户许可即执行代码。因此该漏洞成为恶意代码的载体,通常被用来暗中下载其他恶意软件。1月9日,Bugtraq报告另外两个WMF函数ExtCreateRegion和ExtEscape也有同样的漏洞,但是微软声称这两个漏洞只会造成性能问题 。
dcterms:subject
dbc:Windows_administration dbc:Computer_security_exploits
dbo:wikiPageID
3589914
dbo:wikiPageRevisionID
1124348754
dbo:wikiPageWikiLink
dbr:Anti-virus_software dbr:Windows_Server_2003_R2 dbr:MD5 dbr:Windows_Live_Messenger dbr:Microsoft dbr:Return-oriented_programming dbr:Microsoft_Windows_Server_2003 dbr:Function_(computing) dbr:Trojan_horse_(computing) dbr:Backdoor_(computing) dbr:Anti-virus dbr:Printing dbr:Washington_Post dbr:Compatibility_layer dbr:Windows_Server_2003 dbr:Windows_9x dbr:Unix dbr:Windows_Explorer dbr:Unix-like dbr:Third-party_software_component dbr:Arbitrary_code dbr:F-Secure dbr:Pwnie_Awards dbr:McAfee dbr:Payload_(software) dbr:Operating_system dbr:Workaround dbr:The_Register dbr:MacOS dbr:Windows_NT dbr:Booting dbr:Bifrost_(trojan_horse) dbr:Windows_NT_4.0 dbr:Windows_10 dbr:Metasploit_Project dbr:Mirror_website dbr:Patch_(computing) dbr:US-CERT dbr:Spooling dbr:Vulnerability_(computer_science) dbr:Security_Now! dbr:Bandwidth_(computing) dbr:Sunbelt_Software dbr:Wine_(software) dbr:Windows_XP dbr:Linux dbr:Windows_3.0 dbr:Bézier_curve dbr:Microsoft_Windows dbr:Yahoo!_Messenger dbr:Windows_2000 dbr:SANS_Institute dbr:Data_Execution_Prevention dbr:Preview_(computing) dbr:Instant_messaging dbr:NOD32 dbr:Slashdot_effect dbr:Drive-by_download dbr:Firefox dbc:Computer_security_exploits dbr:Gibson_Research_Corporation dbc:Windows_administration dbr:Podcast dbr:Microsoft_Developer_Network dbr:Windows_NT_4 dbr:Notepad_(Windows) dbr:Defence_in_depth dbr:Freeware dbr:Malware dbr:Windows_Metafile dbr:Internet_Explorer dbr:Checksum dbr:Windows_Update dbr:Legacy_system dbr:E-mail_attachment dbr:Unofficial_patch dbr:Ilfak_Guilfanov dbr:Secunia dbr:Exploit_(computer_science) dbr:Command_Prompt_(Windows) dbr:Graphics_Device_Interface dbr:Web_cache dbr:AOL_Instant_Messenger dbr:Alex_Eckelberry dbr:Common_Vulnerabilities_and_Exposures dbr:Opera_(web_browser) dbr:Eset dbr:Software_architecture dbr:Outlook_Express dbr:Windows_Desktop_Search dbr:Emulator dbr:Slashdot dbr:Microsoft_Outlook dbr:Internet_Storm_Center dbr:Google_Desktop dbr:Dynamic-link_library dbr:Steve_Gibson_(computer_programmer)
dbo:wikiPageExternalLink
n4:0,2817,1907400,00.asp n7:wmf_vulnerability_checker.html n11:210 n14:wmf_vuln.html n15:200601_WMF.mspx n16:diary.php%3Frss&storyid=996 n16:diary.php%3Fstoryid=1010 n16:diary.php%3Fstoryid=981 n17:libwmf.html n16:diary.php%3Fstoryid=992 n16:diary.php%3Fstoryid=994 n19:microsoft-clarifies-dep-issue.html n20:index.php%3Fp=146 n24:archive-012006.html%2300000761 n25:v_137760.htm n24:archive-122005.html%2300000753 n24:archive-122005.html%2300000756 n26:1153244.shtml%3Ftid=201 n28:wmf.htm n29:843018 n30: n31:tools.php n32:%3Fkbid=272969 n33:006520.shtml n29:153790 n38:prntspol_0883.asp n38:prntspol_0d6b.asp n39:417431.aspx n40:exploits.html%23ie_xp_pfv_metafile n41: n43:AR2005122901456.html n44:ms06-001.mspx n46:912840.mspx n47:ms08-021.mspx n48:depcnfxp.mspx
owl:sameAs
dbpedia-fi:WMF-haavoittuvuus n12:3GuAp dbpedia-zh:WMF文件格式漏洞 wikidata:Q3549876 yago-res:Windows_Metafile_vulnerability freebase:m.09nfn_ dbpedia-es:Vulnerabilidad_del_metarchivo_de_Windows dbpedia-lmo:Vulnerabilità_Windows_Metafile
dbp:wikiPageUsesTemplate
dbt:Reflist dbt:Ref dbt:Wikinews dbt:Use_mdy_dates dbt:Note dbt:CVE
dbo:abstract
La vulnerabilidad del metarchivo de Windows, también llamada ejecución de código de imagen del metarchivo y abreviada MCE, es una vulnerabilidad de seguridad en la forma en que algunas versiones del sistema operativo Microsoft Windows manejan imágenes en el formato de metarchivo de Windows. Permite que se ejecute código arbitrario en las computadoras afectadas sin el permiso de sus usuarios. Fue descubierto el 27 de diciembre de 2005 y los primeros informes de las computadoras afectadas se anunciaron en 24 horas. Microsoft lanzó una actualización de alta prioridad para eliminar esta vulnerabilidad a través de Windows Update el 5 de enero de 2006. Los ataques que usan esta vulnerabilidad se conocen como vulnerabilidades de WMF. La vulnerabilidad se encontraba en gdi32.dll y existía en todas las versiones de Microsoft Windows desde Windows 3.0 a Windows Server 2003 R2. Sin embargo, los vectores de ataque solo existen en versiones basadas en NT de Windows (Windows NT, Windows 2000, Windows XP y Windows Server 2003). Los exploits que aprovechan la vulnerabilidad en los sistemas basados en Windows NT facilitaron la propagación de varios tipos de malware, generalmente a través de descargas directas. Debido al impacto extremo, este error ganó el Premio Pwnie 2007 por "Mass 0wnage" y "Breaking the Internet". WMF文件格式漏洞是一个源于微软Windows操作系统的漏洞,被一个计算机安全邮件列表Bugtraq于2005年12月27日公开[1] (页面存档备份,存于互联网档案馆),在24小时内就成为一些恶意程序,例如间谍软件和木马程序的载体。 微软于1月6日发布了针对Windows 2000和Windows XP版本中不当处理WMF函数SETABORTPROC的补丁,并且在1月16日发布了针对Windows Vista的补丁,但是其他的操作系统仍旧会受到该漏洞的威胁。 该漏洞源于Windows的核心模块gdi32.dll处理WMF格式的方式,允许在计算机上不经过用户许可即执行代码。因此该漏洞成为恶意代码的载体,通常被用来暗中下载其他恶意软件。1月9日,Bugtraq报告另外两个WMF函数ExtCreateRegion和ExtEscape也有同样的漏洞,但是微软声称这两个漏洞只会造成性能问题 。 The Windows Metafile vulnerability—also called the Metafile Image Code Execution and abbreviated MICE—is a security vulnerability in the way some versions of the Microsoft Windows operating system handled images in the Windows Metafile format. It permits arbitrary code to be executed on affected computers without the permission of their users. It was discovered on December 27, 2006, and the first reports of affected computers were announced within 24 hours. Microsoft released a high-priority update to eliminate this vulnerability via Windows Update on January 5, 2007. Attacks using this vulnerability are known as WMF exploits. The vulnerability was located in gdi32.dll and existed in all versions of Microsoft Windows from Windows 3.0 to Windows Server 2003 R2. However, attack vectors only exist in NT-based versions of Windows (Windows NT, Windows 2000, Windows XP and Windows Server 2003). Exploits taking advantage of the vulnerability on Windows NT-based systems facilitated the propagation of various types of malware, typically through drive-by downloads. Due to extreme impact, this bug won the 2007 Pwnie Award for "Mass 0wnage" and "Breaking the Internet".
prov:wasDerivedFrom
wikipedia-en:Windows_Metafile_vulnerability?oldid=1124348754&ns=0
dbo:wikiPageLength
23120
foaf:isPrimaryTopicOf
wikipedia-en:Windows_Metafile_vulnerability
Subject Item
dbr:WMF_Backdoor
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
dbo:wikiPageRedirects
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:2005_WMF_vulnerability
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
dbo:wikiPageRedirects
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:WMF_(exploit)
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
dbo:wikiPageRedirects
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:WMF_Exploit
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
dbo:wikiPageRedirects
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:WMF_exploit
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
dbo:wikiPageRedirects
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:WMF_vulnerability
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
dbo:wikiPageRedirects
dbr:Windows_Metafile_vulnerability
Subject Item
dbr:Wmf_vulnerability
dbo:wikiPageWikiLink
dbr:Windows_Metafile_vulnerability
dbo:wikiPageRedirects
dbr:Windows_Metafile_vulnerability
Subject Item
wikipedia-en:Windows_Metafile_vulnerability
foaf:primaryTopic
dbr:Windows_Metafile_vulnerability