A Microsoft spokesperson told SCMagazine.com that the Redmond, Wash.-based corporate giant is investigating vulnerability reports, but is not aware of any public attacks attempting to exploit the flaw.
The company "will take the appropriate action to protect our customers" after the investigation, according to the spokesperson, who said possible remedies may include a patch or advisory.
Microsoft encourages responsible disclosure of vulnerabilities, said the spokesperson.
The flaw was revealed Wednesday on the Month of ActiveX Bugs project blog in a post authored by the project’s creator, a hacker using the name shinnai.
Excessive data passed to the OUACTRL ActiveX control may result in a buffer overflow allowing the execution of arbitrary code or a DoS attack. The vulnerability was fixed in Microsoft Office 2000 Service Pack 3, according to a Wednesday advisory from US-CERT, which encouraged users to follow security best practices in response to reports.
MoAxB has now revealed 24 ActiveX flaws during the month of May. The latest of a growing list of "month of X bugs" projects, MoAxB has faced now-routine criticism from vendors and researchers that it has trampled on responsible disclosure practices.
Month of ActiveX Bugs project reveals Office 2000 flaw
By Frank Washkuch on May 25, 2007 9:36AM