Another ActiveX zero-day bug from Microsoft

Powered by SC Magazine
 

Microsoft is trying to combat another ActiveX vulnerability being actively exploited -- the second in a week.

The latest bug resides in the Spreadsheet ActiveX control in Office Web Components, according to an advisory. It is being exploited in the wild, enabling cybercriminals to attain the same user rights as the local user, though Microsoft did not detail how widespread attacks have been.

It affects a number of software versions, including Office XP and 2003 Service Pack (SP) 3, and Internet Security and Acceleration Server 2004 SP3 and 2006.

Microsoft has previously discouraged the use of the affected ActiveX control -- it was unclear why, based on the advisory, but experts doubt it was because of an imminent security problem. As users await a permanent fix, they are encouraged to apply a workaround, which prevents the Office Web Components Library from running in Internet Explorer.

"Although the Microsoft Office Web Components ActiveX control has been deprecated for some time now, we still recommend customers implement the workarounds as provided in the advisory," wrote Dave Forstrom, a security response group manager, Monday on a company blog.

This is the second time in a week that a zero-day ActiveX issue has cropped up. Last week, Microsoft warned of active exploits taking advantage of a Video ActiveX control to launch drive-by attacks. A fix for the vulnerability, which Microsoft knew about for more than a year, is expected to arrive next week as part of the software giant's monthly security update.

Andrew Storms, director of security operations at networking security firm nCircle, said that ActiveX controls are preferred means of spreading malware because victims are more likely to install a plug-in than an executable.

"It's easier to get the user to accept and install and run that because it's something inside the browser," he told SCMagazineUS.com. "[ActiveX controls] run as the user that you're logged in as. If you could gain remote control over that, you're essentially acting as that user."

Forstrom said Microsoft plans to release a patch for the vulnerability once engineers are confident they have created a fix that is appropriate for "broad distribution."

As a result of a number of active exploits, the Sans Internet Storm Center upgraded its Infocon threat level status to orange, one up from its normal level, for 24 hours.

Storms said users should worry more about last week's reported ActiveX flaw because it does not require any user interaction to be exploited.

"You didn't even get a pop-up or request to do anything," he said. "You've just been infected.


See original article on scmagazineus.com

Copyright © SC Magazine, US edition


Another ActiveX zero-day bug from Microsoft
 
 
 
Top Stories
Microsoft confirms Australian Azure launch
Available from next week.
 
NBN Co names first 140 FTTN sites
National trial extended.
 
Cloud, big data propel bank CISOs into the boardroom
And this time, they are welcome.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Do you direct debit customers? Read this
Oct 10, 2014
Authorities have been targeting direct debit practices with iiNet and Dodo receiving formal ...
Optus expands 4G coverage
Oct 10, 2014
If you rely on an Optus phone for work you might be interested to know that there are now 200 ...
Microsoft Office is now free for some charities
Oct 10, 2014
Microsoft has announced that eligible Australian non-profit organisations and charities can now ...
Vodafone lights up 4G in Adelaide
Oct 9, 2014
Live and work in Adelaide? Vodafone has switched on its 4G network in the city and suburbs.
Next year tradies will be able to take payments using ingogo
Oct 3, 2014
Ingogo is going to provide a card payment service for Xero users.
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  27%
TOTAL VOTES: 248

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  62%
 
No
  38%
TOTAL VOTES: 80

Vote