Attackers gun for new ActiveX flaws

Powered by SC Magazine
 

Exploit code has been released for three ActiveX security flaws, one of which is already being exploited in the wild.

The vulnerabilities target ActiveX plug-ins used by Microsoft's Internet Explorer to load files from third-party applications.

The exploits target popular sites such as MySpace, Facebook and Yahoo's Music Jukebox.

Two of the three vulnerabilities targeted by the exploit code lie within Music Jukebox.

Symantec reported that attackers have already begun exploiting one of the vulnerabilities in order to remotely install malware on targeted systems.

"So far the exploits used in the wild have been carbon copies of the public exploit," wrote Symantec researcher Sean Hittel on a company blog.

"I suspect that it will not take long before the exploit is wrapped in an encoder in an attempt to make detection more difficult."

Facebook and MySpace are vulnerable to the same flaw, a vulnerability in the Aurigma Image Uploader tool.

If exploited, the vulnerability could allow an attacker to remotely execute code with the permissions of the current user.

The US Computer Emergency Response Team urged users to disable ActiveX controls in Internet Explorer.

Copyright ©v3.co.uk


Attackers gun for new ActiveX flaws
 
 
 
Top Stories
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
What InfoSec can learn from the insurance industry
[Blog post] Another way data breach laws could help manage risk.
 
A ten-point plan for disrupting security
[Blog post] How can you defend the perimeter when it’s in the cloud?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1048

Vote