The Microsoft WMI Object Broker ActiveX control bypasses the ActiveX security model, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
ActiveX is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Internet Explorer is a common Windows application that makes use of ActiveX controls.
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user.
This vulnerability was publicly reported by Michal Bucko and H D Moore.
This document was written by Jeff Gennari and Will Dormann.
|Date First Published:||2006-11-01|
|Date Last Updated:||2009-01-05 16:13 UTC|