The ActiveX control, WBEMSingleView.ocx, that is a part of the WMI Administrative Tools package contains a vulnerability.
The AddContextRef() and ReleaseContext() functions of the WMI Object Viewer control can be passed an object pointer from an attacker that results in arbitrary code execution. An Internet Explorer user with WBEMSingleView.ocx installed can be exploited by visiting a malicious web page.
An attacker can execute arbitrary code as the user.
We are currently unaware of a practical solution to this problem.
Disable the WMI Object Viewer ActiveX control in Internet Explorer
The vulnerable ActiveX control can be disabled in Internet Explorer by setting the kill bit for the following CLSID:
This vulnerability was publicly disclosed on WooYun.org.
This document was written by Jared Allar.
|Date First Published:||2010-12-22|
|Date Last Updated:||2010-12-22 16:42 UTC|