Microsoft Agent fails to properly handle specially crafted .ACF files
Vulnerability Note VU#810772
Original Release Date: 2006-11-14 | Last Revised: 2007-02-07
Overview
Microsoft Agent fails to properly handle specially crafted .ACF files and may allow a remote attacker to execute arbitrary code.
Description
Microsoft Agent is a software technology that enables an enriched form of user interaction that can make using and learning to use a computer easier and more natural.
A vulnerability exists in the way that Microsoft Agent handles specially crafted .ACF files. Exploitation can occur when a remote attacker convinces the user to visit a specially crafted web site.
Microsoft states that the following systems are affected:
Microsoft Windows 2000 Service Pack 4
Microsoft Windows XP Service Pack 2
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1
Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
Microsoft Windows Server 2003 x64 Edition
Impact
This vulnerability may allow a remote attacker to execute arbitrary code with the privileges of the local user.
Solution
Apply an update Microsoft has released updates in Microsoft Security Bulletin MS06-068 to address this issue.
Workarounds
Microsoft has provided the following workarounds, please reference MS06-068 for further information.
Temporarily prevent the Microsoft Agent ActiveX control from running in Internet Explorer
Configure Internet Explorer to prompt before running ActiveX Controls or disable ActiveX Controls in the Internet and Local intranet security zone
Set Internet and Local intranet security zone settings to “High” to prompt before running ActiveX Controls and Active Scripting in these zones
No statement is currently available from the vendor regarding this vulnerability.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Addendum
Microsoft Corporation has published Microsoft Security Bulletin MS06-068 in response to this issue. Users are encouraged to review this bulletin and apply the referenced patches.
If you have feedback, comments, or additional information about this vulnerability, please send us email.