Skip to content

customize
National Cyber Alert System
Cyber Security Alert SA06-270A archive

Microsoft Internet Explorer ActiveX Vulnerability

Original release date: September 27, 2006
Last revised: --
Source: US-CERT

Systems Affected

  • Microsoft Windows
  • Internet Explorer

Overview

A vulnerability in ActiveX and Internet Explorer could allow an attacker to take control of your computer.


Solution

Microsoft has not yet released an update to address this vulnerability. Until an update is available, consider the following best practices:

Disable ActiveX

Disabling ActiveX will prevent exploitation of this and other ActiveX vulnerabilities. Instructions for disabling ActiveX in the Internet Zone can be found in "Securing Your Web Browser" and "Improve the safety of your browsing and e-mail activities."

Do not follow unsolicited links

Do not click on unsolicited URLs, including those received in email, instant messages, web forums, or internet relay chat (IRC) channels.


Description

An attacker could exploit a vulnerability in an ActiveX control by convincing a user to visit a web site with Internet Explorer. The attacker could then take any action as the user, including installing malicious software and accessing sensitive personal information.

For more technical information, see Vulnerability Note VU#753044.


References

  • Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/>
  • Vulnerability Note VU#753044 - <http://www.kb.cert.org/vuls/id/753044>
  • Improve the safety of your browsing and e-mail activities - <http://www.microsoft.com/athome/security/online/browsing_safety.mspx>
  • Microsoft Security Essentials - <http://www.microsoft.com/protect/>


  • Feedback can be directed to US-CERT.


    Produced 2006 by US-CERT, a government organization. Terms of use

    Revision History

    September 27, 2006: Initial release

    Last updated September 27, 2006
    print this document