The Microsoft RDS.Dataspace ActiveX control bypasses the ActiveX security model, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
ActiveX is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Internet Explorer is a common Windows application that makes use of ActiveX controls.
If you mark your control as safe for initializing, you are asserting that no matter what values are used to initialize your control, it won't do anything that would damage a user's system or compromise the user's security.
If a remote attacker can persuade a user to access a specially crafted web page, that attacker may be able to execute arbitrary code with the privileges of the compromised user.
Apply an Update
This vulnerability was reported in Microsoft Security Bulletin MS06-014. Microsoft credits Golan Yosef of Finjan's Malicious Code Research Center (MCRC) with providing information regarding this vulnerability.
This document was written by Jeff Gennari.
|Date First Published:||2006-04-11|
|Date Last Updated:||2006-11-02 13:58 UTC|