search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Microsoft Office Web Components Spreadsheet ActiveX control vulnerability

Vulnerability Note VU#545228

Original Release Date: 2009-07-15 | Last Revised: 2009-08-27

Overview

The Microsoft Office Web Components Spreadsheet ActiveX controls (OWC10 and OWC11) contain a vulnerability that may allow an attacker to take control of a vulnerable system.

Description

The Office Web Components Spreadsheet ActiveX control contains a code execution vulnerability. Public reports indicate that this vulnerability is being actively exploited.

Per the MSRC blog, the following products may install the affected control on a system:
Microsoft Office XP Service Pack 3, Microsoft Office 2003 Service Pack 3, Microsoft Office XP Web Components Service Pack 3, Microsoft Office Web Components 2003 Service Pack 3, Microsoft Office 2003 Web Components for the 2007 Microsoft Office system Service Pack 1, Microsoft Internet Security and Acceleration Server 2004 Standard Edition Service Pack 3, Microsoft Internet Security and Acceleration Server 2004 Enterprise Edition Service Pack 3, Microsoft Internet Security and Acceleration Server 2006, Internet Security and Acceleration Server 2006 Supportability Update, Microsoft Internet Security and Acceleration Server 2006 Service Pack 1, Microsoft Office Small Business Accounting 2006.
Further details are available from the Microsoft Security Research & Defense blog.

Impact

A remote attacker may be able to take control of a vulnerable system.

Solution

Install the updates described in Microsoft Security Bulletin MS09-043.

Disable the Office Web Components Spreadsheet ActiveX controls in Internet Explorer

The vulnerable controls can be disabled in Internet Explorer by setting the kill bit for the following CLSIDs:
{0002E541-0000-0000-C000-000000000046} (OWC10)
{0002E559-0000-0000-C000-000000000046}
(OWC11)
More information about how to set the kill bit is available in Microsoft Support Document 240797. Alternatively, the following text can be saved as a .REG file and imported to set the kill bit for these controls:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{0002E541-0000-0000-C000-000000000046}]
"Compatibility Flags"=dword:00000400
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{0002E541-0000-0000-C000-000000000046}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{0002E559-0000-0000-C000-000000000046}]
"Compatibility Flags"=dword:00000400
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{0002E559-0000-0000-C000-000000000046}]
"Compatibility Flags"=dword:00000400
Disable ActiveX

Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this and other ActiveX vulnerabilities. Instructions for disabling ActiveX in the Internet Zone can be found in the Securing Your Web Browser document.

Vendor Information

545228
 

Microsoft Corporation Affected

Updated:  August 26, 2009

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

Install the updates described in Microsoft Security Bulletin MS09-043.

See also:

http://support.microsoft.com/kb/973472
http://blogs.technet.com/msrc/archive/2009/07/13/microsoft-security-advisory-973472-released.aspx
http://blogs.technet.com/srd/archive/2009/07/13/more-information-about-the-office-web-components-activex-vulnerability.aspx


CVSS Metrics

Group Score Vector
Base 0 AV:--/AC:--/Au:--/C:--/I:--/A:--
Temporal 0 E:ND/RL:ND/RC:ND
Environmental 0 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Microsoft for information that was used in this report.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2009-1136
Severity Metric: 44.04
Date Public: 2009-07-13
Date First Published: 2009-07-15
Date Last Updated: 2009-08-27 05:40 UTC
Document Revision: 23

Sponsored by CISA.