SECUNIA ADVISORY ID: SA22687
VERIFY ADVISORY: http://secunia.com/advisories/22687/
CRITICAL: Extremely critical
IMPACT: System access
WHERE: >From remote
OPERATING SYSTEM:
Microsoft Windows XP Professional - http://secunia.com/product/22/
Microsoft Windows XP Home Edition - http://secunia.com/product/16/
Microsoft Windows Server 2003 Web Edition - http://secunia.com/product/1176/
Microsoft Windows Server 2003 Standard Edition - http://secunia.com/product/1173/
Microsoft Windows Server 2003 Enterprise Edition - http://secunia.com/product/1174/
Microsoft Windows Server 2003 Datacenter Edition - http://secunia.com/product/1175/
Microsoft Windows 2000 Server - http://secunia.com/product/20/
Microsoft Windows 2000 Professional - http://secunia.com/product/1/
Microsoft Windows 2000 Datacenter Server - http://secunia.com/product/1177/
Microsoft Windows 2000 Advanced Server - http://secunia.com/product/21/
SOFTWARE: Microsoft Core XML Services (MSXML) 4.x - http://secunia.com/product/6472/
DESCRIPTION: A vulnerability has been reported in Microsoft XML Core Services, which can be exploited by malicious people to compromise a users system. The vulnerability is caused due to an unspecified error in the XMLHTTP 4.0 ActiveX Control. Successful exploitation allows execution of arbitrary code when a user e.g. visits a malicious website using Internet Explorer. NOTE: The vulnerability is already being actively exploited.
SOLUTION: Microsoft has recommended various workarounds including setting the kill-bit for the affected ActiveX control (see the vendor's advisory for details).
PROVIDED AND/OR DISCOVERED BY: Discovered as a 0-day.
ORIGINAL ADVISORY: Microsoft: http://www.microsoft.com/technet/security/advisory/927892.mspx
Microsoft XMLHTTP ActiveX Control Code Execution VulnerabilityPosted on Saturday, November 04, 2006 @ 17:13:52 CST in Security |