9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.97 High
EPSS
Percentile
99.7%
The Microsoft Video ActiveX control contains a stack buffer overflow vulnerability, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Microsoft Windows comes with an ActiveX component called “ActiveX control for streaming video,” which is provided by msvidctl.dll
. This component provides a number of Class Identifiers (CLSIDs) that are marked as Safe for Scripting and Safe for Initialization, which means that they can be used by Internet Explorer. The ActiveX controls provided by msvidctl.dll
fail to properly handle file input, which can result in stack memory corruption. This can allow the Structured Exception Handler (SEH) to be overwritten, thus allowing subversion of the program execution flow.
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user.
Microsoft has released an update to address this issue. See Microsoft Security Bulletin MS09-032 for more information.
Disable the vulnerable ActiveX controls
Microsoft Security Advisory (972890) explains how to disable the 45 ActiveX controls provided by msvidctl.dll
to mitigate this vulnerability. A Microsoft Fix it application is provided in Microsoft Knowledgebase article 972890 to disable these controls.
Disable ActiveX
Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this and other ActiveX vulnerabilities. Instructions for disabling ActiveX in the Internet Zone can be found in the “Securing Your Web Browser” document.
180513
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: July 15, 2009
Affected
We have not received a statement from the vendor.
Please see Microsoft Security Bulletin MS09-032.
See also Microsoft Security Advisory (972890).
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23180513 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This document was written by Will Dormann.
CVE IDs: | CVE-2008-0015 |
---|---|
Severity Metric: | 65.31 Date Public: |
addxorrol.blogspot.com/2009/07/poking-around-msvidctldll.html
blogs.technet.com/srd/archive/2009/07/06/new-vulnerability-in-mpeg2tunerequest-activex-control-object-in-msvidctl-dll.aspx
dvlabs.tippingpoint.com/blog/2009/07/09/microsoft-video-activex-control-0day-technical-details
isc.sans.org/diary.html?storyid=6733
support.microsoft.com/kb/972890
www.csis.dk/dk/nyheder/nyheder.asp?tekstID=799
www.microsoft.com/technet/security/advisory/972890.mspx
www.microsoft.com/technet/security/bulletin/ms09-032.mspx
www.us-cert.gov/cas/techalerts/TA09-187A.html
www.us-cert.gov/cas/techalerts/TA09-195A.html