Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: Internet Explorer XML Vulnerability SANS ISC InfoSec Forums

Watch ISC TV. Great for NOCs, SOCs and Living Rooms: https://isctv.sans.edu

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Internet Explorer XML Vulnerability
Microsoft released a knowledge base article about a newly reported vulnerability in XMLHTTP 4.0 ActiveX Control. This Active-X control is required to interact with specific web sites using XML queries. We are not aware of any widely used applications of this technology. While it is similar to Ajax in scope, it does not look like it is required to use Ajax.

In line with Microsofts advisory, we recommend setting the respective kill bit to disable execution of this ActiveX control:
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\
{88d969c5-f192-11d4-a65f-0040963251e5}]
"Compatibility Flags"=dword:00000400


(we had a mention of a possible PoC from the Month-of-Kernel-bugs project. but it looks like these are two distinct issues)

Johannes

3904 Posts
ISC Handler
Nov 6th 2006

Sign Up for Free or Log In to start participating in the conversation!