US-CERT Technical Cyber Security Alert TA09-187A -- Microsoft Video ActiveX Control Vulnerability

07/07/09, US-CERT Technical Cyber Security Alert TA09-187A -- Microsoft Video ActiveX Control Vulnerability
From: CERT Advisory <cert-advisory@cert.org>

Generated by MHonArc

CSIM Logo WelcomeCourses
Faculty, Student, Staff
Projects and reports
Conferences, workshop and seminars
Laboratories and reasearch facilities
Information related to CSIM
Information non-related to CSIM
Address, map, phone, etc.
Search

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]


To: cert-advisory@cert.org
Subject: US-CERT Technical Cyber Security Alert TA09-187A -- Microsoft Video ActiveX Control Vulnerability
From: CERT Advisory <cert-advisory@cert.org>
Date: Mon, 6 Jul 2009 17:14:40 -0400
List-archive: <http://www.cert.org/>
List-help: <http://www.cert.org/>, <mailto:Majordomo@cert.org?body=help>
List-owner: <mailto:cert-advisory-owner@cert.org>
List-post: NO (posting not allowed on this list)
List-unsubscribe: <mailto:Majordomo@cert.org?body=unsubscribe%20cert-advisory>
Organization: CERT(R) Coordination Center - +1 412-268-7090

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


                    National Cyber Alert System

              Technical Cyber Security Alert TA09-187A


Microsoft Video ActiveX Control Vulnerability

   Original release date: July 06, 2009
   Last revised: --
   Source: US-CERT


Systems Affected

     * Microsoft Windows XP
     * Microsoft Windows Server 2003


Overview

   An unpatched vulnerability in the Microsoft Video ActiveX control
   is being used in attacks.


I. Description

   Microsoft has released Security  Advisory (972890) to describe
   attacks on a vulnerability in the Microsoft Video ActiveX  control.
   Because no fix is currently available for this vulnerability,
   please see the Security Advisory and US-CERT Vulnerability Note
   VU#180513 for workarounds.


II. Impact

   A remote, unauthenticated attacker could execute arbitrary code
   with the privileges of the victim user.


III. Solution

   Apply workarounds
   
   Microsoft has provided workarounds for this vulnerability in
   Security Advisory (972890). Additional details and workarounds are
   provided in US-CERT Vulnerability Note VU#180513.
   
   The most effective workaround for this vulnerability is to set kill
   bits for the Microsoft Video ActiveX control, as outlined in the
   documents noted above.  Other workarounds include disabling
   ActiveX, as specified in the Securing Your Web Browser document,
   and upgrading to Internet Explorer 7 or later, which can help
   mitigate the vulnerability with its ActiveX opt-in feature.


IV. References

 * US-CERT Vulnerability Note VU#180513 -
   <http://www.kb.cert.org/vuls/id/180513>

 * Microsoft Security Advisory (972890) -
   <http://www.microsoft.com/technet/security/advisory/972890.mspx>

 * Securing Your Web Browser -
   <http://www.us-cert.gov/reading_room/securing_browser/>

 ____________________________________________________________________

   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA09-187A.html>
 ____________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <cert@cert.org> with "TA09-187A Feedback VU#180513" in
   the subject.
 ____________________________________________________________________

   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
 ____________________________________________________________________

   Produced 2009 by US-CERT, a government organization.

   Terms of use:

     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________

Revision History
  
  July 06, 2009: Initial release


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBSlJnyXIHljM+H4irAQJuxAgAmY94zTKwprhMdsYJ8/6z5Td2APg0Keyt
wR/ihBM423Lp9NXRNkZQkxk+Fv+whjShJnB6yDBWpDDe9RNlguuAzqGd3L6q7B54
TOjfGcn1b61n6DMrKjx20bJvOOrMT3JHgePXwWjF8iDo8AnHYdv+ARwt2KvyRbxg
Ve4wWRB6tkJtX8cqJwjvYjW2ayo9tjV9sV5+qUSdyhHOvT6jSc/C8JBF4NzE0jx0
R0vfXhfA1QIqz9XjdpdWG7iyAXxa51k92XTHa3ohIQGWDI2qzN8RFHh9xUuCVZWx
UgoRdnc1oKc7lsw6Po9oW4PPQzGVxbzTAqP94eWN0zSTIpw4u75pQA==
=fhVj
-----END PGP SIGNATURE-----

Previous message sorted by date: US-CERT Technical Cyber Security Alert TA09-161A -- Adobe Acrobat and Reader Vulnerabilities
Next message sorted by date: US-CERT Technical Cyber Security Alert TA09-195A -- Microsoft Updates for Multiple Vulnerabilities
Previous message sorted by thread: US-CERT Technical Cyber Security Alert TA09-161A -- Adobe Acrobat and Reader Vulnerabilities
Next message by thread: US-CERT Technical Cyber Security Alert TA09-195A -- Microsoft Updates for Multiple Vulnerabilities
Main Index
Thread Index

CSIM home pageWMailAccount managementCSIM LibraryNetwork test toolsSearch CSIM directories
Contact us: Olivier Nicole CSIM    SET    AIT Last update: Jan 2010