Lucene search

K
certCERTVU:234812
HistoryApr 11, 2006 - 12:00 a.m.

RDS.Dataspace ActiveX control bypasses ActiveX security model

2006-04-1100:00:00
www.kb.cert.org
18

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.967 High

EPSS

Percentile

99.6%

Overview

The Microsoft RDS.Dataspace ActiveX control bypasses the ActiveX security model, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.

Description

ActiveX

ActiveX is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Internet Explorer is a common Windows application that makes use of ActiveX controls.
**
ActiveX safety determination**

Internet Explorer determines if an ActiveX control is safe by querying the IObjectSafety interface of the object and by querying the Implemented Categories registry key for the control, as specified by Microsoft Knowledge Base Article 216434 and the MSDN ActiveX safety article.
**
ActiveX security options**

Through either the IObjectSafety interface or the appropriate registry values, an ActiveX control can be marked as “safe for scripting” and/or “safe for initialization.” According to the MSDN article Signing and Marking ActiveX Controls:

If you mark your control as safe for initializing, you are asserting that no matter what values are used to initialize your control, it won’t do anything that would damage a user’s system or compromise the user’s security.
_
If you mark your control as safe for scripting, you are asserting that your control won’t do anything to damage a user’s system or compromise the user’s security, regardless of how your control’s methods and properties are manipulated by the Web page’s script. In other words, it has to accept any method calls (with any parameters) and/or property manipulations in any order without doing anything bad._
Microsoft Data Access Components and Remote Data Service (RDS)

MDAC is a collection of utilities and routines to process requests between databases and network applications. The RDS component provides an intermediary step for a client’s request for service from a back-end database. The component enables the web site to apply business logic to the request.

The Problem

The RDS.Dataspace ActiveX control includes a method that can create an instance of an ActiveX control that exists on the system. The ActiveX objects created in this manner will bypass the ActiveX security model. In particular, the “safe for scripting” and killbit options are ignored. Note that in default configurations of Internet Explorer, the RDS.Dataspace ActiveX control cannot be loaded in the Internet Zone.

Note that exploit code for this vulnerability is publicly available.

More information is available in Microsoft Security Bulletin MS06-014.


Impact

If a remote attacker can persuade a user to access a specially crafted web page, that attacker may be able to execute arbitrary code with the privileges of the compromised user.


Solution

Apply an Update
This issue is addressed in Microsoft Security Bulletin MS06-014.


Disable theRDS.Dataspace ActiveX controlin Internet Explorer

The RDS.Dataspace ActiveX control can be disabled in Internet Explorer by setting the kill bit for the following CLSID:

{BD96C556-65A3-11D0-983A-00C04FC29E36}
More information about how to set the kill bit is available in Microsoft Support Document 240797.
**
Disable ActiveX**

Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this vulnerability. Instructions for disabling ActiveX in the Internet Zone can be found in the "Securing Your Web Browser" document and the Malicious Web Scripts FAQ.


Vendor Information

234812

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: April 11, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Refer to <http://www.microsoft.com/technet/security/Bulletin/MS06-014.mspx&gt;.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23234812 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported in Microsoft Security Bulletin MS06-014. Microsoft credits Golan Yosef of Finjan’s Malicious Code Research Center (MCRC) with providing information regarding this vulnerability.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2006-0003
Date Public: 2006-04-11 Date First Published:

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.967 High

EPSS

Percentile

99.6%