A vulnerability exists in the Microsoft MSN "Hrtbeat.ocx" ActiveX control.
ActiveX is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Microsoft Internet Explorer provides support for the ActiveX technology. There is a vulnerability in the Microsoft MSN "Hrtbeat.ocx" ActiveX control. This control provides support for online gaming when visiting MSN related sites. The following information is provided in MS04-038:
This update sets the kill bit for the Hrtbeat.ocx ActiveX control. This control implements support for online gaming in MSN related sites. Internet Explorer no longer supports this control. This control has been found to contain a security vulnerability. To help protect customers who have this control installed, this update prevents the control from running or from being reintroduced onto users’ systems by setting the kill bit for the control. For more information about kill bits, see Microsoft Knowledge Base Article 240797.
For information on preventing ActiveX controls from running in Internet Explorer, please refer to the Microsoft article "How to Stop an ActiveX Control from Running in Internet Explorer."
The impact of this vulnerability is not known. In the case of a buffer overflow, a remote attacker could execute arbitrary code with the privileges of the user running Internet Explorer. The attacker may also be able to cause a denial of service.
Apply the appropriate patch referenced in Microsoft Security Bulletin MS04-038.
Vendor| Status| Date Notified| Date Updated
Microsoft Corporation| | -| 19 Oct 2004
If you are a vendor and your product is affected, let us know.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A
This vulnerability was reported by Microsoft. Microsoft credits NGS Software Ltd. for discovering the vulnerability.
This document was written by Damon Morda and Art Manion.