Overview
The Microsoft RDS.Dataspace ActiveX control bypasses the ActiveX security model, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
ActiveX ActiveX is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Internet Explorer is a common Windows application that makes use of ActiveX controls. If you mark your control as safe for initializing, you are asserting that no matter what values are used to initialize your control, it won't do anything that would damage a user's system or compromise the user's security. |
Impact
If a remote attacker can persuade a user to access a specially crafted web page, that attacker may be able to execute arbitrary code with the privileges of the compromised user. |
Solution
Apply an Update |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported in Microsoft Security Bulletin MS06-014. Microsoft credits Golan Yosef of Finjan's Malicious Code Research Center (MCRC) with providing information regarding this vulnerability.
This document was written by Jeff Gennari.
Other Information
CVE IDs: | CVE-2006-0003 |
Date Public: | 2006-04-11 |
Date First Published: | 2006-04-11 |
Date Last Updated: | 2006-11-02 13:58 UTC |
Document Revision: | 19 |