Attackers gun for new ActiveX flaws

Powered by SC Magazine
 

Exploit code has been released for three ActiveX security flaws, one of which is already being exploited in the wild.

The vulnerabilities target ActiveX plug-ins used by Microsoft's Internet Explorer to load files from third-party applications.

The exploits target popular sites such as MySpace, Facebook and Yahoo's Music Jukebox.

Two of the three vulnerabilities targeted by the exploit code lie within Music Jukebox.

Symantec reported that attackers have already begun exploiting one of the vulnerabilities in order to remotely install malware on targeted systems.

"So far the exploits used in the wild have been carbon copies of the public exploit," wrote Symantec researcher Sean Hittel on a company blog.

"I suspect that it will not take long before the exploit is wrapped in an encoder in an attempt to make detection more difficult."

Facebook and MySpace are vulnerable to the same flaw, a vulnerability in the Aurigma Image Uploader tool.

If exploited, the vulnerability could allow an attacker to remotely execute code with the permissions of the current user.

The US Computer Emergency Response Team urged users to disable ActiveX controls in Internet Explorer.

Copyright ©v3.co.uk


Attackers gun for new ActiveX flaws
 
 
 
Top Stories
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Images: the next frontier in data analytics?
Barclay’s global data chief says we’re still at the starting line.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  13%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  26%
TOTAL VOTES: 415

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  55%
 
No
  45%
TOTAL VOTES: 195

Vote