Overview
The Microsoft WMI Object Broker ActiveX control bypasses the ActiveX security model, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
ActiveX ActiveX is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Internet Explorer is a common Windows application that makes use of ActiveX controls. |
Impact
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user. |
Solution
Apply Updates |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.microsoft.com/technet/security/advisory/927709.mspx
- http://www.microsoft.com/technet/security/bulletin/ms06-073.mspx
- http://www.microsoft.com/technet/security/Bulletin/MS07-016.mspx
- http://support.microsoft.com/kb/925674
- http://support.microsoft.com/kb/929233/
- http://msdn.microsoft.com/workshop/components/activex/safety.asp
- http://support.microsoft.com/kb/240797
- http://secunia.com/advisories/22603/
- http://www.securityfocus.com/bid/20797
- http://www.zerodayinitiative.com/advisories/ZDI-06-047.html
Acknowledgements
This vulnerability was publicly reported by Michal Bucko and H D Moore.
This document was written by Jeff Gennari and Will Dormann.
Other Information
CVE IDs: | CVE-2006-4704 |
Severity Metric: | 37.46 |
Date Public: | 2006-11-01 |
Date First Published: | 2006-11-01 |
Date Last Updated: | 2009-01-05 16:13 UTC |
Document Revision: | 32 |