Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
The latest bug resides in the Spreadsheet ActiveX control in Office Web Components, according to an advisory. It is being exploited in the wild, enabling cybercriminals to attain the same user rights as the local user, though Microsoft did not detail how widespread attacks have been.It affects a number of software versions, including Office XP and 2003 Service Pack (SP) 3, and Internet Security and Acceleration Server 2004 SP3 and 2006.Microsoft has previously discouraged the use of the affected ActiveX control -- it was unclear why, based on the advisory, but experts doubt it was because of an imminent security problem. As users await a permanent fix, they are encouraged to apply a workaround, which prevents the Office Web Components Library from running in Internet Explorer."Although the Microsoft Office Web Components ActiveX control has been deprecated for some time now, we still recommend customers implement the workarounds as provided in the advisory," wrote Dave Forstrom, a security response group manager, Monday on a company blog.This is the second time in a week that a zero-day ActiveX issue has cropped up. Last week, Microsoft warned of active exploits taking advantage of a Video ActiveX control to launch drive-by attacks. A fix for the vulnerability, which Microsoft knew about for more than a year, is expected to arrive next week as part of the software giant's monthly security update.Andrew Storms, director of security operations at networking security firm nCircle, said that ActiveX controls are preferred means of spreading malware because victims are more likely to install a plug-in than an executable."It's easier to get the user to accept and install and run that because it's something inside the browser," he told SCMagazineUS.com. "[ActiveX controls] run as the user that you're logged in as. If you could gain remote control over that, you're essentially acting as that user."Forstrom said Microsoft plans to release a patch for the vulnerability once engineers are confident they have created a fix that is appropriate for "broad distribution." As a result of a number of active exploits, the Sans Internet Storm Center upgraded its Infocon threat level status to orange, one up from its normal level, for 24 hours.Storms said users should worry more about last week's reported ActiveX flaw because it does not require any user interaction to be exploited."You didn't even get a pop-up or request to do anything," he said. "You've just been infected.See original article on scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.