Overview
The Microsoft Log Sink Class ActiveX control is incorrectly marked safe for scripting. This may allow a remote attacker to create or append to arbitrary files on a vulnerable system.
Description
ActiveX ActiveX is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Internet Explorer is a common Windows application that makes use of ActiveX controls. |
Impact
By convincing a victim to click on a link in an HTML document (web page, HTML email), an attacker could create or append to arbitrary files on a vulnerable system within the security context of the user running IE. These files could contain code that could be executed through other means. The user may click the file inadvertently, or the file may be placed in a sensitive location, such as the Windows Startup folder. |
Solution
Install an update |
There have been a number of significant vulnerabilities in technologies relating to the IE domain/zone security model, local file system (Local Machine Zone) trust, the Dynamic HTML (DHTML) document object model (in particular, proprietary DHTML features), the HTML Help system, MIME type determination, the graphical user interface (GUI), and ActiveX. These technologies are implemented in operating system libraries that are used by IE and many other programs to provide web browser functionality. IE is integrated into Windows to such an extent that vulnerabilities in IE or other ActiveX controls frequently provide an attacker significant access to the operating system. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://support.microsoft.com/kb/837253/
- http://support.microsoft.com/kb/321780/
- http://support.microsoft.com/kb/216434/
- http://support.microsoft.com/kb/830242/
- http://www.microsoft.com/sharepoint/server/downloads/sp2.asp
- http://msdn.microsoft.com/workshop/components/activex/safety.asp
- http://msdn.microsoft.com/workshop/components/activex/security.asp
- http://office.microsoft.com/en-us/officeupdate/default.aspx
Acknowledgements
This vulnerability was reported by Microsoft.
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2005-0360 |
Severity Metric: | 38.31 |
Date Public: | 2003-01-13 |
Date First Published: | 2005-06-27 |
Date Last Updated: | 2005-06-29 14:14 UTC |
Document Revision: | 22 |