Another ActiveX zero-day bug from Microsoft

Powered by SC Magazine
 

Microsoft is trying to combat another ActiveX vulnerability being actively exploited -- the second in a week.

The latest bug resides in the Spreadsheet ActiveX control in Office Web Components, according to an advisory. It is being exploited in the wild, enabling cybercriminals to attain the same user rights as the local user, though Microsoft did not detail how widespread attacks have been.

It affects a number of software versions, including Office XP and 2003 Service Pack (SP) 3, and Internet Security and Acceleration Server 2004 SP3 and 2006.

Microsoft has previously discouraged the use of the affected ActiveX control -- it was unclear why, based on the advisory, but experts doubt it was because of an imminent security problem. As users await a permanent fix, they are encouraged to apply a workaround, which prevents the Office Web Components Library from running in Internet Explorer.

"Although the Microsoft Office Web Components ActiveX control has been deprecated for some time now, we still recommend customers implement the workarounds as provided in the advisory," wrote Dave Forstrom, a security response group manager, Monday on a company blog.

This is the second time in a week that a zero-day ActiveX issue has cropped up. Last week, Microsoft warned of active exploits taking advantage of a Video ActiveX control to launch drive-by attacks. A fix for the vulnerability, which Microsoft knew about for more than a year, is expected to arrive next week as part of the software giant's monthly security update.

Andrew Storms, director of security operations at networking security firm nCircle, said that ActiveX controls are preferred means of spreading malware because victims are more likely to install a plug-in than an executable.

"It's easier to get the user to accept and install and run that because it's something inside the browser," he told SCMagazineUS.com. "[ActiveX controls] run as the user that you're logged in as. If you could gain remote control over that, you're essentially acting as that user."

Forstrom said Microsoft plans to release a patch for the vulnerability once engineers are confident they have created a fix that is appropriate for "broad distribution."

As a result of a number of active exploits, the Sans Internet Storm Center upgraded its Infocon threat level status to orange, one up from its normal level, for 24 hours.

Storms said users should worry more about last week's reported ActiveX flaw because it does not require any user interaction to be exploited.

"You didn't even get a pop-up or request to do anything," he said. "You've just been infected.


See original article on scmagazineus.com

Copyright © SC Magazine, US edition


Another ActiveX zero-day bug from Microsoft
 
 
 
Top Stories
Inside the stalemate on Australia's piracy code
Still not registered almost five months on.
 
IT staff outline deep anger in Macquarie Uni survey
‘Morale at lowest point in a decade’.
 
Cost blowout to push NBN past $41bn budget
But government funding cap to remain.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Say goodbye to OneDrive Groups
Aug 28, 2015
If you've a) actually been using OneDrive and b) gone so far as to actually have been using ...
Libreoffice 5 review
Aug 24, 2015
It's free! It's open! But does LibreOffice deliver on its promise of a powerful office suite for ...
How to disable Cortana in Windows 10
Aug 21, 2015
Stop Microsoft's personal assistant snooping around.
Uni is optional: 5 tech leaders without a degree
Aug 17, 2015
Already running a business, but thinking about going back to uni? From Bill Gates to Steve Jobs, ...
New features coming to Xero
Aug 17, 2015
Use Xero? Here are some of the things you can look forward to in the coming months.
Latest Comments
Polls
New Windows 10 users, are you upgrading from...




   |   View results
Windows 8
  47%
 
Windows 7
  44%
 
Windows XP
  5%
 
Another operating system
  3%
 
Windows Vista
  2%
TOTAL VOTES: 709

Vote