ActiveX Flaw Identified

Microsoft is investigating reports of a vulnerability in a Windows ActiveX control that could allow an attacker to remotely take control of a computer, according to an advisory issued Friday. One security company rated the vulnerability critical, while Microsoft said it allows only limited attacks.

The vulnerability, which was not patched as of this morning, affects certain versions of Windows running Microsoft XML Core Services 4.0, a set of tools that allows programmers to use scripting languages to access XML documents.

The affected versions are Windows 2000 Service Pack 4, Windows XP Service Pack 2, Windows Server 2003, and Microsoft Windows Server 2003 Service Pack 1.

Web Site Triggers Bug

A user would have to visit a specially-crafted Web site that triggers the XMLHTTP 4.0 ActiveX control, Microsoft said. The attacker would then have the same rights on the machines as the current logged-on user, and could gain complete control of the machine. A similar flaw that took advantage of the XMLHTTP ActiveX control surfaced nearly five years ago and was later patched.

Users can protect themselves by disabling the affected ActiveX control, although the workaround could stop some Web sites from functioning correctly. Microsoft describes how to disable the control in an advisory.

Varied Diagnosis

The SANS Institute classified the flaw as a zero-day vulnerability, meaning the problem is public but not patched. The French Security Incident Response Team called it "critical."

Microsoft issues patches for its software on the second Tuesday on the month. The speed at which a patch is issued depends on the risk of the vulnerability, and the company has issued patches out of cycle for widely-exploited vulnerabilities.

To comment on this article and other PCWorld content, visit our Facebook page or our Twitter feed.
Shop Tech Products at Amazon