Vulnerability Note VU#234812

RDS.Dataspace ActiveX control bypasses ActiveX security model

Original Release date: 11 Apr 2006 | Last revised: 02 Nov 2006

Overview

The Microsoft RDS.Dataspace ActiveX control bypasses the ActiveX security model, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.

Description

ActiveX

ActiveX is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Internet Explorer is a common Windows application that makes use of ActiveX controls.

ActiveX safety determination


Internet Explorer determines if an ActiveX control is safe by querying the IObjectSafety interface of the object and by querying the Implemented Categories registry key for the control, as specified by Microsoft Knowledge Base Article 216434 and the MSDN ActiveX safety article.

ActiveX security options


Through either the IObjectSafety interface or the appropriate registry values, an ActiveX control can be marked as "safe for scripting" and/or "safe for initialization." According to the MSDN article Signing and Marking ActiveX Controls:


    If you mark your control as safe for initializing, you are asserting that no matter what values are used to initialize your control, it won't do anything that would damage a user's system or compromise the user's security.

    If you mark your control as safe for scripting, you are asserting that your control won't do anything to damage a user's system or compromise the user's security, regardless of how your control's methods and properties are manipulated by the Web page's script. In other words, it has to accept any method calls (with any parameters) and/or property manipulations in any order without doing anything bad.
Microsoft Data Access Components and Remote Data Service (RDS)

MDAC is a collection of utilities and routines to process requests between databases and network applications. The RDS component provides an intermediary step for a client's request for service from a back-end database. The component enables the web site to apply business logic to the request.

The Problem

The RDS.Dataspace ActiveX control includes a method that can create an instance of an ActiveX control that exists on the system. The ActiveX objects created in this manner will bypass the ActiveX security model. In particular, the "safe for scripting" and killbit options are ignored. Note that in default configurations of Internet Explorer, the RDS.Dataspace ActiveX control cannot be loaded in the Internet Zone.

Note that exploit code for this vulnerability is publicly available.

More information is available in Microsoft Security Bulletin MS06-014.

Impact

If a remote attacker can persuade a user to access a specially crafted web page, that attacker may be able to execute arbitrary code with the privileges of the compromised user.

Solution

Apply an Update
This issue is addressed in Microsoft Security Bulletin MS06-014.


Disable the RDS.Dataspace ActiveX control in Internet Explorer

The RDS.Dataspace ActiveX control can be disabled in Internet Explorer by setting the kill bit for the following CLSID:

    {BD96C556-65A3-11D0-983A-00C04FC29E36}
More information about how to set the kill bit is available in Microsoft Support Document 240797.

Disable ActiveX


Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this vulnerability. Instructions for disabling ActiveX in the Internet Zone can be found in the "Securing Your Web Browser" document and the Malicious Web Scripts FAQ

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-11 Apr 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was reported in Microsoft Security Bulletin MS06-014. Microsoft credits Golan Yosef of Finjan's Malicious Code Research Center (MCRC) with providing information regarding this vulnerability.

This document was written by Jeff Gennari.

Other Information

  • CVE IDs: CVE-2006-0003
  • Date Public: 11 Apr 2006
  • Date First Published: 11 Apr 2006
  • Date Last Updated: 02 Nov 2006
  • Document Revision: 18

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.