Portal Home |  IS News Menu |  Portal Menu |  ISB Menu |  Main Content
ALERT: Visual Studio ActiveX Zero-Day - PoC Published
02 Nov 12:34

In a Security Advisory from october 31st Microsoft reports that it is investigating a vulnerability in an ActiveX control in Visual Studio 2005. A Proof of Concept code exploiting the vulnerability has been published.

The ActiveX control in question is the WMI Object Broker, which is installed with Visual Studio 2005 on Windows. Only these users are vulnerable. Users running VS on Windows 2003 and W2003 Service Pack 1 in their default configuration, with Enhanced Security Configuration turned on, are not affected. IE 7 disables this ActiveX control by default, so users are not vulnerable while running Internet Explorer 7 under the default configuration - they only become vulnerable if they use the ActiveX opt-in feature in the Internet Zone. In any event users would need to visit a malicious web site to be attacked.

Successful exploitation could lead to full compromise. In the larger picture this is probably not a high-risk vulnerability because few people have Visual Studio running. However, for those that do, it is a serious vulnerability.

Some sources of further information below.

Related links: (Open in a new window.)
External link www.microsoft.com/technet/security/advisory/927709.mspx
External link www.securityfocus.com/bid/20843
External link www.websensesecuritylabs.com/alerts/alert.php?AlertID=688

View Printable View printable version (opens in new window)
Back Back