{"cve": [{"lastseen": "2018-11-01T05:12:46", "bulletinFamily": "NVD", "description": "The Microsoft Data Analyzer ActiveX control (aka the Office Excel ActiveX control for Data Analysis) in max3activex.dll in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows remote attackers to execute arbitrary code via a crafted web page that corrupts the \"system state,\" aka \"Microsoft Data Analyzer ActiveX Control Vulnerability.\"", "modified": "2018-10-30T12:27:21", "published": "2010-02-10T13:30:01", "id": "CVE-2010-0252", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0252", "title": "CVE-2010-0252", "type": "cve", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:33", "bulletinFamily": "software", "description": "Microsoft Security Bulletin MS10-008 - Critical\r\nCumulative Security Update of ActiveX Kill Bits (978262)\r\nPublished: February 09, 2010\r\n\r\nVersion: 1.0\r\nGeneral Information\r\nExecutive Summary\r\n\r\nThis security update addresses a privately reported vulnerability for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000 and Windows XP, Important for all supported editions of Windows Vista and Windows 7, Moderate for all supported editions of Windows Server 2003, and Low for all supported editions of Windows Server 2008 and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section.\r\n\r\nThe vulnerability could allow remote code execution if a user views a specially crafted Web page that instantiates an ActiveX control with Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes kill bits for four third-party ActiveX controls.\r\n\r\nThe security update addresses the vulnerability by setting a kill bit so that the vulnerable control does not run in Internet Explorer. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection under the next section, Vulnerability Information.\r\n\r\nRecommendation. The majority of customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871.\r\n\r\nFor administrators and enterprise installations, or end users who want to install this security update manually, Microsoft recommends that customers apply the update immediately using update management software, or by checking for updates using the Microsoft Update service.\r\n\r\nSee also the section, Detection and Deployment Tools and Guidance, later in this bulletin.\r\n\r\nKnown Issues. None\r\nTop of sectionTop of section\r\nAffected and Non-Affected Software\r\n\r\nThe following software have been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, visit Microsoft Support Lifecycle.\r\n\r\nAffected Software\r\nOperating System\tMaximum Security Impact\tAggregated Severity Rating\tBulletins Replaced by This Update\r\n\r\nMicrosoft Windows 2000 Service Pack 4\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS09-055\r\n\r\nWindows XP Service Pack 2 and Windows XP Service Pack 3\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS09-055\r\n\r\nWindows XP Professional x64 Edition Service Pack 2\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS09-055\r\n\r\nWindows Server 2003 Service Pack 2\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\t\r\n\r\nMS09-055\r\n\r\nWindows Server 2003 x64 Edition Service Pack 2\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\t\r\n\r\nMS09-055\r\n\r\nWindows Server 2003 with SP2 for Itanium-based Systems\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\t\r\n\r\nMS09-055\r\n\r\nWindows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS09-055\r\n\r\nWindows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS09-055\r\n\r\nWindows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2**\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nLow\r\n\t\r\n\r\nMS09-055\r\n\r\nWindows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2**\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nLow\r\n\t\r\n\r\nMS09-055\r\n\r\nWindows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nLow\r\n\t\r\n\r\nMS09-055\r\n\r\nWindows 7 for 32-bit Systems\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS09-055\r\n\r\nWindows 7 for x64-based Systems\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS09-055\r\n\r\nWindows Server 2008 R2 for x64-based Systems**\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nLow\r\n\t\r\n\r\nMS09-055\r\n\r\nWindows Server 2008 R2 for Itanium-based Systems\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nLow\r\n\t\r\n\r\nMS09-055\r\n\r\n**Server Core installation not affected. The vulnerabilities addressed by this update do not affect supported editions of Windows Server 2008 or Windows Server 2008 R2 as indicated, when installed using the Server Core installation option. For more information on this installation option, see the MSDN articles, Server Core and Server Core for Windows Server 2008 R2. Note that the Server Core installation option does not apply to certain editions of Windows Server 2008 and Windows Server 2008 R2; see Compare Server Core Installation Options.\r\nTop of sectionTop of section\r\n\t\r\nFrequently Asked Questions (FAQ) Related to This Security Update\r\n\r\nWhat kill bits does this Cumulative Security Update of ActiveX Kill Bits contain? \r\nThis Cumulative Security Update of ActiveX Kill Bits contains new kill bits and all kill bits previously released in MS08-023, Security Update of ActiveX Kill Bits; MS08-032, Cumulative Security Update of ActiveX Kill Bits; MS09-032, Cumulative Security Update of ActiveX Kill Bits; MS09-055, Cumulative Security Update of ActiveX Kill Bits; and advisories entitled Update Rollup for ActiveX Kill Bits, Microsoft Security Advisory 953839, Microsoft Security Advisory 956391, Microsoft Security Advisory 960715, and Microsoft Security Advisory 969898.\r\n\r\nWhat is a kill bit?\r\nA security feature in Microsoft Internet Explorer makes it possible to prevent an ActiveX control from ever being loaded by the Internet Explorer HTML-rendering engine. This is done by making a registry setting and is referred to as setting the kill bit. After the kill bit is set, the control can never be loaded, even when it is fully installed. Setting the kill bit makes sure that even if a vulnerable component is introduced or is re-introduced to a system, it remains inert and harmless.\r\n\r\nFor more information on kill bits, see Microsoft Knowledge Base Article 240797: How to stop an ActiveX control from running in Internet Explorer.\r\n\r\nWhat is a security update of ActiveX kill bits? \r\nA security update of ActiveX kill bits contains the class IDs (CLSID) of certain ActiveX controls that are the basis of the security update. This security bulletin lists these CLSIDs in the Vulnerability Information section.\r\n\r\nWhy does this update not contain any binary files? \r\nThis update only makes changes to the registry to disable the controls from instantiating in Internet Explorer.\r\n\r\nShould I install this update if I do not have the affected component installed or use the affected platform? \r\nYes. Installing this update will block the vulnerable control from running in Internet Explorer.\r\n\r\nDo I need to reapply this update if I install an ActiveX control discussed in this security update at a later date? \r\nNo, reapplying this update is not required. The kill bit will block Internet Explorer from running the control even if the control is installed at a later date.\r\n\r\nDoes this update contain any kill bits that are not Microsoft-specific? \r\nYes. Microsoft has been requested by organizations to set the kill bit for controls that the organizations own and have found to be vulnerable. See the subsection, "Third-Party Kill Bits," in the Vulnerability Information section.\r\n\r\nDoes this update contain kill bits that were previously shipped in a Microsoft Security Update? \r\nThis update sets the kill bits for the RSClientPrint ActiveX control previously addressed in the Microsoft Security Bulletin MS09-062.\r\n\r\nFor more information regarding this ActiveX control and how it may be updated, review the Microsoft Bulletin Vulnerabilities in GDI+ Could Allow Remote Code Execution (957488).\r\n\r\nDoes this update contain kill bits that were previously shipped in an Internet Explorer security update? \r\nNo, this update does not include kill bits that were previously shipped in an Internet Explorer security update. We recommend that you install the latest Cumulative Security Update for Internet Explorer.\r\n\r\nWhy does this security update have different severity levels for different Windows operating systems? \r\nThis update has different severity levels because different mitigations apply to the vulnerability depending on the operating system. One such mitigation is that Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode known as Enhanced Security Configuration.\r\n\r\nI am using an older release of the software discussed in this security bulletin. What should I do? \r\nThe affected software listed in this bulletin have been tested to determine which releases are affected. Other releases are past their support life cycle. To determine the support life cycle for your software release, visit Microsoft Support Lifecycle.\r\n\r\nIt should be a priority for customers who have older releases of the software to migrate to supported releases to prevent potential exposure to vulnerabilities. For more information about the Windows Product Lifecycle, visit the following Microsoft Support Lifecycle. For more information about the extended security update support period for these software releases, visit the Microsoft Product Support Services Web site.\r\n\r\nCustomers who require custom support for older software must contact their Microsoft account team representative, their Technical Account Manager, or the appropriate Microsoft partner representative for custom support options. Customers without an Alliance, Premier, or Authorized Contract can contact their local Microsoft sales office. For contact information, visit the Microsoft Worldwide Information Web site, select the country, and then click Go to see a list of telephone numbers. When you call, ask to speak with the local Premier Support sales manager. For more information, see the Windows Operating System Product Support Lifecycle FAQ.\r\nTop of sectionTop of section\r\nVulnerability Information\r\n\t\r\nSeverity Ratings and Vulnerability Identifiers\r\n\r\nThe following severity ratings assume the potential maximum impact of the vulnerability. For information regarding the likelihood, within 30 days of this security bulletin's release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the February bulletin summary. For more information, see Microsoft Exploitability Index.\r\nVulnerability Severity Rating and Maximum Security Impact by Affected Software\r\nOperating System\tMicrosoft Data Analyzer ActiveX Control Vulnerability - CVE-2010-0252\tAggregate Severity Rating\r\n\r\nMicrosoft Windows 2000 Service Pack 4\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nWindows XP Service Pack 2 and Windows XP Service Pack 3\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nWindows XP Professional x64 Edition Service Pack 2\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nWindows Server 2003 Service Pack 2\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\r\nWindows Server 2003 x64 Edition Service Pack 2\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\r\nWindows Server 2003 with SP2 for Itanium-based Systems\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\r\nWindows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\r\nWindows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2\r\n\t\r\n\r\nImportant\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\r\nWindows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2**\r\n\t\r\n\r\nLow\r\nRemote Code Execution\r\n\t\r\n\r\nLow\r\n\r\nWindows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2**\r\n\t\r\n\r\nLow\r\nRemote Code Execution\r\n\t\r\n\r\nLow\r\n\r\nWindows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2\r\n\t\r\n\r\nLow\r\nRemote Code Execution\r\n\t\r\n\r\nLow\r\n\r\nWindows 7 for 32-bit Systems\r\n\t\r\n\r\nImportant\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\r\nWindows 7 x64 Edition\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\r\nWindows Server 2008 R2 for x64-based Systems**\r\n\t\r\n\r\nLow\r\nRemote Code Execution\r\n\t\r\n\r\nLow\r\n\r\nWindows Server 2008 R2 for Itanium-based Systems\r\n\t\r\n\r\nLow\r\nRemote Code Execution\r\n\t\r\n\r\nLow\r\n\r\n**Server Core installation not affected. The vulnerabilities addressed by this update do not affect supported editions of Windows Server 2008 or Windows Server 2008 R2 as indicated, when installed using the Server Core installation option. For more information on this installation option, see the MSDN articles, Server Core and Server Core for Windows Server 2008 R2. Note that the Server Core installation option does not apply to certain editions of Windows Server 2008 and Windows Server 2008 R2; see Compare Server Core Installation Options.\r\nTop of sectionTop of section\r\n\t\r\nMicrosoft Data Analyzer ActiveX Control Vulnerability - CVE-2010-0252\r\n\r\nA remote code execution vulnerability exists in the Microsoft Data Analyzer ActiveX Control. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.\r\n\r\nTo view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2010-0252.\r\n\t\r\nMitigating Factors for Microsoft Data Analyzer ActiveX Control Vulnerability - CVE-2010-0252\r\n\r\nMitigation refers to a setting, common configuration, or general best-practice, existing in a default state that could reduce the severity of exploitation of vulnerability. The following mitigating factors may be helpful in your situation:\r\n\u2022\t\r\n\r\nIn a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker\u2019s Web site.\r\n\u2022\t\r\n\r\nAn attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\r\n\u2022\t\r\n\r\nA malicious Web site cannot exploit this vulnerability on systems where Microsoft Data Analyzer is not already installed.\r\nTop of sectionTop of section\r\n\t\r\nWorkarounds for Microsoft Data Analyzer ActiveX Control Vulnerability - CVE-2010-0252\r\n\r\nWorkaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:\r\n\u2022\t\r\n\r\nPrevent COM objects from running in Internet Explorer\r\n\r\nYou can disable attempts to instantiate a COM object in Internet Explorer by setting the kill bit for the control in the registry.\r\n\r\nWarning If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk.\r\n\r\nFor detailed steps that you can use to prevent a control from running in Internet Explorer, see Microsoft Knowledge Base Article 240797. Follow the steps in this article to create a Compatibility Flags value in the registry to prevent a COM object from being instantiated in Internet Explorer.\r\n\r\nNote The Class Identifiers and corresponding files where the ActiveX objects are contained are documented under "What does the update do?" in the FAQ for Microsoft Data Analyzer ActiveX Control Vulnerability - CVE-2010-0252 section. Replace {XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX} below with the Class Identifiers found in that section.\r\n\r\nTo set the kill bit for a CLSID with a value of {XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX}, paste the following text in a text editor such as Notepad. Then, save the file by using the .reg file name extension.\r\n\r\nWindows Registry Editor Version 5.00\r\n[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX}]\r\n"Compatibility Flags"=dword:00000400\r\n\r\n[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX}]\r\n"Compatibility Flags"=dword:00000400\r\n\r\nYou can apply this .reg file to individual systems by double-clicking it.\r\n\r\nYou can apply this .reg file to individual systems by double-clicking it. You can also apply it across domains by using Group Policy. For more information about Group Policy, visit the following Microsoft Web sites:\r\n\u2022\t\r\n\r\nGroup Policy collection\r\n\u2022\t\r\n\r\nWhat is Group Policy Object Editor?\r\n\u2022\t\r\n\r\nCore Group Policy tools and settings\r\n\r\nNote You must restart Internet Explorer for your changes to take effect.\r\n\r\nImpact of Workaround. There is no impact as long as the object is not intended to be used in Internet Explorer.\r\n\r\nHow to undo the workaround. Delete the registry keys previously added in implementing this workaround.\r\n\u2022\t\r\n\r\nSet Internet and Local intranet security zone settings to "High" to prompt before running ActiveX Controls and Active Scripting in these zones\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings for the Internet security zone to prompt before running ActiveX controls and Active Scripting. You can do this by setting your browser security to High.\r\n\r\nTo raise the browsing security level in Internet Explorer, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nOn the Internet Explorer Tools menu, click Internet Options.\r\n\r\n2.\r\n\t\r\n\r\nIn the Internet Options dialog box, click the Security tab, and then click the Internet icon.\r\n\r\n3.\r\n\t\r\n\r\nUnder Security level for this zone, move the slider to High. This sets the security level for all Web sites you visit to High.\r\n\r\nNote If no slider is visible, click Default Level, and then move the slider to High.\r\n\r\nNote Setting the level to High may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly even with the security setting set to High.\r\n\r\nImpact of workaround. There are side effects to prompting before running ActiveX Controls and Active Scripting. Many Web sites that are on the Internet or on an intranet use ActiveX or Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use ActiveX Controls to provide menus, ordering forms, or even account statements. Prompting before running ActiveX Controls or Active Scripting is a global setting that affects all Internet and intranet sites. You will be prompted frequently when you enable this workaround. For each prompt, if you feel you trust the site that you are visiting, click Yes to run ActiveX Controls or Active Scripting. If you do not want to be prompted for all these sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nHow to undo the workaround. In Internet Options, return the slider to your previous setting or click Reset all zones to default level.\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to require a prompt before it runs ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\n\u2022\t\r\n\r\nConfigure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone. To do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Internet Options on the Tools menu.\r\n\r\n2.\r\n\t\r\n\r\nClick the Security tab.\r\n\r\n3.\r\n\t\r\n\r\nClick Internet, and then click Custom Level.\r\n\r\n4.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n5.\r\n\t\r\n\r\nClick Local intranet, and then click Custom Level.\r\n\r\n6.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n7.\r\n\t\r\n\r\nClick OK two times to return to Internet Explorer.\r\n\r\nNote Disabling Active Scripting in the Internet and Local intranet security zones may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly.\r\n\r\nImpact of workaround. There are side effects to prompting before running Active Scripting. Many Web sites that are on the Internet or on an intranet use Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use Active Scripting to provide menus, ordering forms, or even account statements. Prompting before running Active Scripting is a global setting that affects all Internet and intranet sites. You will be prompted frequently when you enable this workaround. For each prompt, if you feel you trust the site that you are visiting, click Yes to run Active Scripting. If you do not want to be prompted for all these sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nHow to undo the workaround. In Security Settings, return to your previous settings or else click Reset.\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to require a prompt before it runs ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.Click OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\nTop of sectionTop of section\r\n\t\r\nFAQ for Microsoft Data Analyzer ActiveX Control Vulnerability - CVE-2010-0252\r\n\r\nWhat is the scope of the vulnerability? \r\nThis is a remote code execution vulnerability. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.\r\n\r\nIf a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\r\n\r\nWhat causes the vulnerability? \r\nWhen the ActiveX control is used in Internet Explorer, the control may corrupt the system state in such a way that an attacker could execute arbitrary code.\r\n\r\nWhat might an attacker use the vulnerability to do? \r\nAn attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\r\n\r\nHow could an attacker exploit the vulnerability? \r\nAn attacker could host a specially crafted Web site that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the Web site. This can also include compromised Web sites and Web sites that accept or host user-provided content or advertisements. These Web sites could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger request that takes users to the attacker's Web site. It could also be possible to display specially crafted Web content by using banner advertisements or by using other methods to deliver Web content to affected systems.\r\n\r\nWhat is the component affected by the vulnerability? \r\nThe vulnerability affects the Microsoft Data Analyzer ActiveX control.\r\n\r\nWhat is the Microsoft Data Analyzer ActiveX control?\r\nThe Microsoft Data Analyzer ActiveX control allows programmatic control of the Data Analyzer from COM-based development applications such as Microsoft Visual Basic. For more information, see the MSDN article, Exploring Microsoft Data Analyzer Programmability.\r\n\r\nWhat systems are primarily at risk from the vulnerability? \r\nThis vulnerability in the Microsoft Data Analyzer ActiveX control requires that a user be logged on and visiting a Web site for any malicious action to occur. Therefore, any systems where the Microsoft Data Analyzer ActiveX control is installed and where Internet Explorer is used frequently, such as workstations or terminal servers, are at the most risk from this vulnerability.\r\n\r\nWhat does the update do? \r\nThe update disables the Microsoft ActiveX controls by setting the kill bit for the Class Identifiers hosted in the library files listed below:\r\nClass Identifier\tFile\tDescription\r\n\r\n{E0ECA9C3-D669-4EF4-8231-00724ED9288F}\r\n\t\r\n\r\nmax3activex.dll\r\n\t\r\n\r\nOffice Excel ActiveX control for Data Analysis\r\n\r\nWhen this security bulletin was issued, had this vulnerability been publicly disclosed? \r\nNo. Microsoft received information about this vulnerability through responsible disclosure.\r\n\r\nWhen this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited? \r\nNo. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers and had not seen any examples of proof of concept code published when this security bulletin was originally issued.\r\nTop of sectionTop of section\r\nTop of sectionTop of section\r\n\t\r\nThird-Party Kill Bits\r\n\r\nThis update includes kill bits to prevent the following ActiveX controls from being run in Internet Explorer:\r\n\u2022\t\r\n\r\nSymantec has requested a kill bit for the ActiveX control for Symantec WinFax Pro 10.3. Please see the post for more information about Symantec's recommendation for customers to set the kill bit for the control. If you have any questions or concerns regarding the kill bit for the Symantec WinFax Pro 10.3 control, please contact Symantec Security at secure@symantec.com. The class identifier (CLSID) for this ActiveX control is:\r\n\u2022\t\r\n\r\n{C05A1FBC-1413-11D1-B05F-00805F4945F6}.\r\n\u2022\t\r\n\r\nGoogle has requested a kill bit for the ActiveX control for Google Desktop Gadget v5.8. If you have any questions or concerns regarding Google Desktop Gadget Control v5.8, please contact Google security at security@google.com. The class identifier (CLSID) for this ActiveX control is:\r\n\u2022\t\r\n\r\n{5D80A6D1-B500-47DA-82B8-EB9875F85B4D}.\r\n\u2022\t\r\n\r\nFacebook has requested a kill bit for the ActiveX control for Facebook Photo Updater 5.5.8. The new control can be found here. If you have any questions or concerns regarding the kill bit for the Facebook Image Uploader ActiveX control, please contact Facebook Security. The class identifier (CLSID) for this ActiveX control is:\r\n\u2022\t\r\n\r\n{0CCA191D-13A6-4E29-B746-314DEE697D83}.\r\n\u2022\t\r\n\r\nPanda Security has requested a kill bit for the ActiveX control for PandaActiveScan Installer 2.0. The new control can be found here. If you have any questions or concerns regarding the kill bit for the Panda Security ActiveX control, please contact Panda Security. The class identifier (CLSID) for this ActiveX control is:\r\n\u2022\t\r\n\r\n{2d8ed06d-3c30-438b-96ae-4d110fdc1fb8}.\r\n\r\nOther Information\r\nAcknowledgments\r\n\r\nMicrosoft thanks the following for working with us to help protect customers:\r\n\u2022\t\r\n\r\nShaun Colley of NGS Software for reporting the Microsoft Data Analyzer ActiveX Control Vulnerability (CVE-2010-0252)\r\nTop of sectionTop of section\r\nMicrosoft Active Protections Program (MAPP)\r\n\r\nTo improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please visit the active protections Web sites provided by program partners, listed in Microsoft Active Protections Program (MAPP) Partners.\r\n\r\nSupport\r\n\u2022\t\r\n\r\nCustomers in the U.S. and Canada can receive technical support from Security Support or 1-866-PCSAFETY. There is no charge for support calls that are associated with security updates. For more information about available support options, see Microsoft Help and Support.\r\n\u2022\t\r\n\r\nInternational customers can receive support from their local Microsoft subsidiaries. There is no charge for support that is associated with security updates. For more information about how to contact Microsoft for support issues, visit the International Support Web site.\r\n\r\nDisclaimer\r\n\r\nThe information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.\r\n\r\nRevisions\r\n\u2022\t\r\n\r\nV1.0 (February 9, 2010): Bulletin published.", "modified": "2010-02-10T00:00:00", "published": "2010-02-10T00:00:00", "id": "SECURITYVULNS:DOC:23204", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:23204", "title": "Microsoft Security Bulletin MS10-008 - Critical Cumulative Security Update of ActiveX Kill Bits (978262)", "type": "securityvulns", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:35", "bulletinFamily": "software", "description": "Microsoft Security Bulletin MS10-034 - Critical\r\nCumulative Security Update of ActiveX Kill Bits (980195)\r\nPublished: June 08, 2010\r\n\r\nVersion: 1.0\r\nGeneral Information\r\nExecutive Summary\r\n\r\nThis security update addresses two privately reported vulnerabilities for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Vista, and Windows 7, and Moderate for all supported editions of Windows Server 2003, Windows Server2008, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section.\r\n\r\nThe vulnerabilities could allow remote code execution if a user views a specially crafted Web page that instantiates a specific ActiveX control with Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes kill bits for four third-party ActiveX controls.\r\n\r\nThe security update addresses the vulnerabilities by setting kill bits so that the vulnerable controls do not run in Internet Explorer. For more information about the vulnerabilities, see the Frequently Asked Questions (FAQ) subsections under the next section, Vulnerability Information.\r\n\r\nRecommendation. The majority of customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871.\r\n\r\nFor administrators and enterprise installations, or end users who want to install this security update manually, Microsoft recommends that customers apply the update immediately using update management software, or by checking for updates using the Microsoft Update service.\r\n\r\nSee also the section, Detection and Deployment Tools and Guidance, later in this bulletin.\r\n\r\nKnown Issues. None\r\nTop of sectionTop of section\r\nAffected and Non-Affected Software\r\n\r\nThe following software have been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, visit Microsoft Support Lifecycle.\r\n\r\nAffected Software\r\nOperating System\tMaximum Security Impact\tAggregated Severity Rating\tBulletins Replaced by This Update\r\n\r\nMicrosoft Windows 2000 Service Pack 4\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-008\r\n\r\nWindows XP Service Pack 2 and Windows XP Service Pack 3\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-008\r\n\r\nWindows XP Professional x64 Edition Service Pack 2\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-008\r\n\r\nWindows Server 2003 Service Pack 2\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\t\r\n\r\nMS10-008\r\n\r\nWindows Server 2003 x64 Edition Service Pack 2\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\t\r\n\r\nMS10-008\r\n\r\nWindows Server 2003 with SP2 for Itanium-based Systems\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\t\r\n\r\nMS10-008\r\n\r\nWindows Vista Service Pack 1 and Windows Vista Service Pack 2\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-008\r\n\r\nWindows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-008\r\n\r\nWindows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2**\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\t\r\n\r\nMS10-008\r\n\r\nWindows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2**\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\t\r\n\r\nMS10-008\r\n\r\nWindows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\t\r\n\r\nMS10-008\r\n\r\nWindows 7 for 32-bit Systems\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-008\r\n\r\nWindows 7 for x64-based Systems\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-008\r\n\r\nWindows Server 2008 R2 for x64-based Systems**\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\t\r\n\r\nMS10-008\r\n\r\nWindows Server 2008 R2 for Itanium-based Systems\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\t\r\n\r\nMS10-008\r\n\r\n**Server Core installation not affected. The vulnerabilities addressed by this update do not affect supported editions of Windows Server 2008 or Windows Server 2008 R2 as indicated, when installed using the Server Core installation option. For more information on this installation option, see the MSDN articles, Server Core and Server Core for Windows Server 2008 R2. Note that the Server Core installation option does not apply to certain editions of Windows Server 2008 and Windows Server 2008 R2; see Compare Server Core Installation Options.\r\nTop of sectionTop of section\r\n\t\r\nFrequently Asked Questions (FAQ) Related to This Security Update\r\n\r\nWhat kill bits does this Cumulative Security Update of ActiveX Kill Bits contain? \r\nThis Cumulative Security Update of ActiveX Kill Bits contains new kill bits and all kill bits previously released in MS08-023, Security Update of ActiveX Kill Bits; MS08-032, Cumulative Security Update of ActiveX Kill Bits; MS09-032, Cumulative Security Update of ActiveX Kill Bits; MS09-055, Cumulative Security Update of ActiveX Kill Bits; MS10-008, Cumulative Security Update of ActiveX Kill Bits; and advisories entitled Update Rollup for ActiveX Kill Bits, Microsoft Security Advisory 953839, Microsoft Security Advisory 956391, Microsoft Security Advisory 960715, and Microsoft Security Advisory 969898.\r\n\r\nWhat is a kill bit?\r\nA security feature in Microsoft Internet Explorer makes it possible to prevent an ActiveX control from ever being loaded by the Internet Explorer HTML-rendering engine. This is done by making a registry setting and is referred to as setting the kill bit. After the kill bit is set, the control can never be loaded, even when it is fully installed. Setting the kill bit makes sure that even if a vulnerable component is introduced or is re-introduced to a system, it remains inert and harmless.\r\n\r\nFor more information on kill bits, see Microsoft Knowledge Base Article 240797: How to stop an ActiveX control from running in Internet Explorer.\r\n\r\nWhat is a security update of ActiveX kill bits? \r\nA security update of ActiveX kill bits contains the class IDs (CLSID) of certain ActiveX controls that are the basis of the security update. This security bulletin lists these CLSIDs in the Vulnerability Information section.\r\n\r\nWhy does this update not contain any binary files? \r\nThis update only makes changes to the registry to disable the controls from instantiating in Internet Explorer.\r\n\r\nShould I install this update if I do not have the affected component installed or use the affected platform? \r\nYes. Installing this update will block the vulnerable control from running in Internet Explorer.\r\n\r\nDo I need to reapply this update if I install an ActiveX control discussed in this security update at a later date? \r\nNo, reapplying this update is not required. The kill bit will block Internet Explorer from running the control even if the control is installed at a later date.\r\n\r\nDoes this update contain any kill bits that are not Microsoft-specific? \r\nYes. Microsoft has been requested by organizations to set the kill bit for controls that the organizations own and have found to be vulnerable. See the subsection, "Third-Party Kill Bits," in the Vulnerability Information section.\r\n\r\nDoes this update contain kill bits that were previously shipped in a Microsoft Security Update? \r\nThis update sets the kill bits for the Outlook View Controls ActiveX control previously addressed in Microsoft Security Bulletin MS09-060.\r\n\r\nFor more information regarding this ActiveX control and how it may be updated, review the Microsoft security bulletin, Vulnerabilities in Microsoft Active Template Library (ATL) ActiveX Controls for Microsoft Office Could Allow Remote Code Execution (973965).\r\n\r\nDoes this update contain kill bits that were previously shipped in an Internet Explorer security update? \r\nNo, this update does not include kill bits that were previously shipped in an Internet Explorer security update. We recommend that you install the latest Cumulative Security Update for Internet Explorer.\r\n\r\nWhy does this security update have different severity levels for different Windows operating systems? \r\nThis update has different severity levels because different mitigations apply to the vulnerability depending on the operating system. One such mitigation is that Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode known as Enhanced Security Configuration.\r\n\r\nI am using an older release of the software discussed in this security bulletin. What should I do? \r\nThe affected software listed in this bulletin have been tested to determine which releases are affected. Other releases are past their support life cycle. To determine the support life cycle for your software release, visit Microsoft Support Lifecycle.\r\n\r\nIt should be a priority for customers who have older releases of the software to migrate to supported releases to prevent potential exposure to vulnerabilities. For more information about the Windows Product Lifecycle, visit the following Microsoft Support Lifecycle. For more information about the extended security update support period for these software releases, visit the Microsoft Product Support Services Web site.\r\n\r\nCustomers who require custom support for older software must contact their Microsoft account team representative, their Technical Account Manager, or the appropriate Microsoft partner representative for custom support options. Customers without an Alliance, Premier, or Authorized Contract can contact their local Microsoft sales office. For contact information, visit the Microsoft Worldwide Information Web site, select the country, and then click Go to see a list of telephone numbers. When you call, ask to speak with the local Premier Support sales manager. For more information, see the Windows Operating System Product Support Lifecycle FAQ.\r\nTop of sectionTop of section\r\nVulnerability Information\r\n\t\r\nSeverity Ratings and Vulnerability Identifiers\r\nVulnerability Severity Rating and Maximum Security Impact by Affected Software\r\nOperating System\tMicrosoft Data Analyzer ActiveX Control Vulnerability - CVE-2010-0252\tMicrosoft Internet Explorer 8 Developer Tools Vulnerability- CVE-2010-0811\tAggregate Severity Rating\r\n\r\nMicrosoft Windows 2000 Service Pack 4\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nCritical\r\n\r\nWindows XP Service Pack 2 and Windows XP Service Pack 3\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nWindows XP Professional x64 Edition Service Pack 2\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nWindows Server 2003 Service Pack 2\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\r\nWindows Server 2003 x64 Edition Service Pack 2\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\r\nWindows Server 2003 with SP2 for Itanium-based Systems\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate\r\n\r\nWindows Vista Service Pack 1 and Windows Vista Service Pack 2\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nWindows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2\r\n\t\r\n\r\nImportant\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nWindows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2**\r\n\t\r\n\r\nLow\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\r\nWindows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2**\r\n\t\r\n\r\nLow\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\r\nWindows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2\r\n\t\r\n\r\nLow\r\nRemote Code Execution\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate\r\n\r\nWindows 7 for 32-bit Systems\r\n\t\r\n\r\nImportant\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nWindows 7 x64 Edition\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nWindows Server 2008 R2 for x64-based Systems**\r\n\t\r\n\r\nLow\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\r\nWindows Server 2008 R2 for Itanium-based Systems\r\n\t\r\n\r\nLow\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\nRemote Code Execution\r\n\t\r\n\r\nModerate\r\n\r\n**Server Core installation not affected. The vulnerabilities addressed by this update do not affect supported editions of Windows Server 2008 or Windows Server 2008 R2 as indicated, when installed using the Server Core installation option. For more information on this installation option, see the MSDN articles, Server Core and Server Core for Windows Server 2008 R2. Note that the Server Core installation option does not apply to certain editions of Windows Server 2008 and Windows Server 2008 R2; see Compare Server Core Installation Options.\r\nTop of sectionTop of section\r\n\t\r\nMicrosoft Data Analyzer ActiveX Control Vulnerability - CVE-2010-0252\r\n\r\nA remote code execution vulnerability exists in the Microsoft Data Analyzer ActiveX Control. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.\r\n\r\nTo view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2010-0252.\r\n\t\r\nMitigating Factors for Microsoft Data Analyzer ActiveX Control Vulnerability - CVE-2010-0252\r\n\r\nMitigation refers to a setting, common configuration, or general best-practice, existing in a default state that could reduce the severity of exploitation of vulnerability. The following mitigating factors may be helpful in your situation:\r\n\u2022\t\r\n\r\nIn a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker\u2019s Web site.\r\n\u2022\t\r\n\r\nAn attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\r\n\u2022\t\r\n\r\nA malicious Web site cannot exploit this vulnerability on systems where Microsoft Data Analyzer is not already installed. Microsoft Data Analyzer is not installed in Microsoft Office systems by default.\r\nTop of sectionTop of section\r\n\t\r\nWorkarounds for Microsoft Data Analyzer ActiveX Control Vulnerability - CVE-2010-0252\r\n\r\nWorkaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:\r\n\u2022\t\r\n\r\nEnable or disable ActiveX Controls in Office 2007\r\n\r\nTo reduce the possibility of this vulnerability being exploited through an Office 2007 document using an ActiveX control, follow the steps below to disable ActiveX controls within Office documents. For more information about disabling ActiveX controls in Office 2007, see the Microsoft Office Online article, Enable or disable ActiveX controls in Office documents.\r\n\r\nOpen the Trust Center in Office 2007 applications using one of the following methods. Once you have selected the ActiveX Settings, select Disable all controls without notification, and then click OK.\r\n\r\nNote If you change an ActiveX control setting in one Office application, the settings are also changed in all the other Office programs on your computer.\r\n\r\nExcel\r\n\r\nClick the Microsoft Office button, select Excel Options, select TrustCenter, select Trust Center Settings, and then select ActiveX Settings.\r\n\r\nOutlook\r\n\r\nFrom the Tools menu, select TrustCenter, select Trust Center Settings, and then select ActiveX Settings.\r\n\r\nPowerPoint\r\n\r\nClick the Microsoft Office button, select PowerPoint Options, select Trust Center, select Trust Center Settings, and then select ActiveX Settings.\r\n\r\nWord\r\n\r\nClick the Microsoft Office button, select Word Options, select Trust Center, select TrustCenter Settings, and then select ActiveX Settings.\r\n\r\nAccess\r\n\r\nClick the Microsoft Office button, select Access Options, select Trust Center, select Trust Center Settings, and then select ActiveX Settings.\r\n\r\nInfoPath\r\n\r\nFrom the Tools menu, select Trust Center, select Trust Center Settings, and then select ActiveX Settings.\r\n\r\nPublisher\r\n\r\nFrom the Tools menu, select Trust Center, select Trust Center Settings, and then select ActiveX Settings.\r\n\r\nVisio\r\n\r\nFrom the Tools menu, select Trust Center, select Trust Center Settings, and then select ActiveX Settings.\r\n\r\nImpact of workaround. ActiveX controls will not be instantiated in Microsoft Office applications.\r\n\u2022\t\r\n\r\nPrevent COM objects from running in Internet Explorer\r\n\r\nYou can disable attempts to instantiate a COM object in Internet Explorer by setting the kill bit for the control in the registry.\r\n\r\nWarning If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk.\r\n\r\nFor detailed steps that you can use to prevent a control from running in Internet Explorer, see Microsoft Knowledge Base Article 240797. Follow the steps in this article to create a Compatibility Flags value in the registry to prevent a COM object from being instantiated in Internet Explorer.\r\n\r\nNote The Class Identifiers and corresponding files where the ActiveX objects are contained are documented under "What does the update do?" in the FAQ for Microsoft Data Analyzer ActiveX Control Vulnerability - CVE-2010-0252 section. Replace {XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX} below with the Class Identifiers found in that section.\r\n\r\nTo set the kill bit for a CLSID with a value of {XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX}, paste the following text in a text editor such as Notepad. Then, save the file by using the .reg file name extension.\r\n\r\nWindows Registry Editor Version 5.00\r\n[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX}]\r\n"Compatibility Flags"=dword:00000400\r\n\r\n[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX}]\r\n"Compatibility Flags"=dword:00000400\r\n\r\nYou can apply this .reg file to individual systems by double-clicking it. You can also apply it across domains by using Group Policy. For more information about Group Policy, visit the following Microsoft Web sites:\r\n\u2022\t\r\n\r\nGroup Policy collection\r\n\u2022\t\r\n\r\nWhat is Group Policy Object Editor?\r\n\u2022\t\r\n\r\nCore Group Policy tools and settings\r\n\r\nNote You must restart Internet Explorer for your changes to take effect.\r\n\r\nImpact of Workaround. There is no impact as long as the object is not intended to be used in Internet Explorer.\r\n\r\nHow to undo the workaround. Delete the registry keys previously added in implementing this workaround.\r\n\u2022\t\r\n\r\nSet Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings for the Internet security zone to block ActiveX controls and Active Scripting. You can do this by setting your browser security to High.\r\n\r\nTo raise the browsing security level in Internet Explorer, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nOn the Internet Explorer Tools menu, click Internet Options.\r\n\r\n2.\r\n\t\r\n\r\nIn the Internet Options dialog box, click the Security tab, and then click the Internet icon.\r\n\r\n3.\r\n\t\r\n\r\nUnder Security level for this zone, move the slider to High. This sets the security level for all Web sites you visit to High.\r\n\r\nNote If no slider is visible, click Default Level, and then move the slider to High.\r\n\r\nNote Setting the level to High may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly even with the security setting set to High.\r\n\r\nImpact of workaround. There are side effects to blocking ActiveX Controls and Active Scripting. Many Web sites that are on the Internet or on an intranet use ActiveX or Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use ActiveX Controls to provide menus, ordering forms, or even account statements. Blocking ActiveX Controls or Active Scripting is a global setting that affects all Internet and intranet sites. If you do not want to block ActiveX Controls or Active Scripting for such sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nHow to undo the workaround. In Internet Options, return the slider to your previous setting or click Reset all zones to default level.\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to block ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\n\u2022\t\r\n\r\nConfigure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone. To do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Internet Options on the Tools menu.\r\n\r\n2.\r\n\t\r\n\r\nClick the Security tab.\r\n\r\n3.\r\n\t\r\n\r\nClick Internet, and then click Custom Level.\r\n\r\n4.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n5.\r\n\t\r\n\r\nClick Local intranet, and then click Custom Level.\r\n\r\n6.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n7.\r\n\t\r\n\r\nClick OK two times to return to Internet Explorer.\r\n\r\nNote Disabling Active Scripting in the Internet and Local intranet security zones may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly.\r\n\r\nImpact of workaround. There are side effects to prompting before running Active Scripting. Many Web sites that are on the Internet or on an intranet use Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use Active Scripting to provide menus, ordering forms, or even account statements. Prompting before running Active Scripting is a global setting that affects all Internet and intranet sites. You will be prompted frequently when you enable this workaround. For each prompt, if you feel you trust the site that you are visiting, click Yes to run Active Scripting. If you do not want to be prompted for all these sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nHow to undo the workaround. In Security Settings, return to your previous settings or else click Reset.\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to require a prompt before it runs ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.Click OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\nTop of sectionTop of section\r\n\t\r\nFAQ for Microsoft Data Analyzer ActiveX Control Vulnerability - CVE-2010-0252\r\n\r\nWhat is the scope of the vulnerability? \r\nThis is a remote code execution vulnerability. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.\r\n\r\nIf a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\r\n\r\nWhat causes the vulnerability? \r\nWhen the ActiveX control is used in Internet Explorer, the control may corrupt the system state in such a way that an attacker could execute arbitrary code.\r\n\r\nWhat might an attacker use the vulnerability to do? \r\nAn attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\r\n\r\nHow could an attacker exploit the vulnerability? \r\nAn attacker could host a specially crafted Web site that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the Web site. This can also include compromised Web sites and Web sites that accept or host user-provided content or advertisements. These Web sites could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger request that takes users to the attacker's Web site. It could also be possible to display specially crafted Web content by using banner advertisements or by using other methods to deliver Web content to affected systems.\r\n\r\nWhat is the component affected by the vulnerability? \r\nThe vulnerability affects the Microsoft Data Analyzer ActiveX control.\r\n\r\nIs this control installed by default in Microsoft Office? \r\nNo, this control requires manual installation by the user separate from the Office installation. It cannot be hosted and instantiated by a Web site without previously being installed on the user's system.\r\n\r\nWhat is the Microsoft Data Analyzer ActiveX control?\r\nThe Microsoft Data Analyzer ActiveX control allows programmatic control of the Data Analyzer from COM-based development applications such as Microsoft Visual Basic. For more information, see the MSDN article, Exploring Microsoft Data Analyzer Programmability.\r\n\r\nWhat systems are primarily at risk from the vulnerability? \r\nThis vulnerability in the Microsoft Data Analyzer ActiveX control requires that a user be logged on and visiting a Web site for any malicious action to occur. Therefore, any systems where the Microsoft Data Analyzer ActiveX control is installed and where Internet Explorer is used frequently, such as workstations or terminal servers, are at the most risk from this vulnerability.\r\n\r\nWhat does the update do? \r\nThe update disables the Microsoft ActiveX controls by setting the kill bit for the Class Identifiers hosted in the library files listed below:\r\nClass Identifier\tFile\tDescription\r\n\r\n{14FD1463-1F3F-4357-9C03-2080B442F503}\r\n\t\r\n\r\nmax3activex.dll\r\n\t\r\n\r\nOffice Excel ActiveX control for Data Analysis\r\n\r\n{E9CB13DB-20AB-43C5-B283-977C58FB5754}\r\n\t\r\n\r\nmax3activex.dll\r\n\t\r\n\r\nOffice Excel ActiveX control for Data Analysis\r\n\r\nWhen this security bulletin was issued, had this vulnerability been publicly disclosed? \r\nNo. Microsoft received information about this vulnerability through responsible disclosure.\r\n\r\nWhen this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited? \r\nNo. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers and had not seen any examples of proof of concept code published when this security bulletin was originally issued.\r\nTop of sectionTop of section\r\nTop of sectionTop of section\r\n\t\r\nMicrosoft Internet Explorer 8 Developer Tools Vulnerability- CVE-2010-0811\r\n\r\nA remote code execution vulnerability exists in the Microsoft Internet Explorer 8 Developer Tools. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.\r\n\r\nTo view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2010-0811.\r\n\t\r\nMitigating Factors for Microsoft Internet Explorer 8 Developer Tools Vulnerability- CVE-2010-0811\r\n\r\nMitigation refers to a setting, common configuration, or general best-practice, existing in a default state that could reduce the severity of exploitation of vulnerability. The following mitigating factors may be helpful in your situation:\r\n\u2022\t\r\n\r\nIn a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker\u2019s Web site.\r\n\u2022\t\r\n\r\nAn attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\r\nTop of sectionTop of section\r\n\t\r\nWorkarounds for Microsoft Internet Explorer 8 Developer Tools Vulnerability- CVE-2010-0811\r\n\r\nWorkaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:\r\n\u2022\t\r\n\r\nEnable or disable ActiveX Controls in Office 2007\r\n\r\nTo reduce the possibility of this vulnerability being exploited through an Office 2007 document using an ActiveX control, follow the steps below to disable ActiveX controls within Office documents. For more information about disabling ActiveX controls in Office 2007, see the Microsoft Office Online article, Enable or disable ActiveX controls in Office documents.\r\n\r\nOpen the Trust Center in Office 2007 applications using one of the following methods. Once you have selected the ActiveX Settings, select Disable all controls without notification, and then click OK.\r\n\r\nNote If you change an ActiveX control setting in one Office application, the settings are also changed in all the other Office programs on your computer.\r\n\r\nExcel\r\n\r\nClick the Microsoft Office button, select Excel Options, select TrustCenter, select Trust Center Settings, and then select ActiveX Settings.\r\n\r\nOutlook\r\n\r\nFrom the Tools menu, select TrustCenter, select Trust Center Settings, and then select ActiveX Settings.\r\n\r\nPowerPoint\r\n\r\nClick the Microsoft Office button, select PowerPoint Options, select Trust Center, select Trust Center Settings, and then select ActiveX Settings.\r\n\r\nWord\r\n\r\nClick the Microsoft Office button, select Word Options, select Trust Center, select TrustCenter Settings, and then select ActiveX Settings.\r\n\r\nAccess\r\n\r\nClick the Microsoft Office button, select Access Options, select Trust Center, select Trust Center Settings, and then select ActiveX Settings.\r\n\r\nInfoPath\r\n\r\nFrom the Tools menu, select Trust Center, select Trust Center Settings, and then select ActiveX Settings.\r\n\r\nPublisher\r\n\r\nFrom the Tools menu, select Trust Center, select Trust Center Settings, and then select ActiveX Settings.\r\n\r\nVisio\r\n\r\nFrom the Tools menu, select Trust Center, select Trust Center Settings, and then select ActiveX Settings.\r\n\r\nImpact of workaround. ActiveX controls will not be instantiated in Microsoft Office applications.\r\n\u2022\t\r\n\r\nPrevent COM objects from running in Internet Explorer\r\n\r\nYou can disable attempts to instantiate a COM object in Internet Explorer by setting the kill bit for the control in the registry.\r\n\r\nWarning If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk.\r\n\r\nFor detailed steps that you can use to prevent a control from running in Internet Explorer, see Microsoft Knowledge Base Article 240797. Follow the steps in this article to create a Compatibility Flags value in the registry to prevent a COM object from being instantiated in Internet Explorer.\r\n\r\nNote The Class Identifiers and corresponding files where the ActiveX objects are contained are documented under "What does the update do?" in the FAQ for Microsoft Internet Explorer 8 Developer Tools Vulnerability - CVE-2010-0811 section. Replace {XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX} below with the Class Identifiers found in that section.\r\n\r\nTo set the kill bit for a CLSID with a value of {XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX}, paste the following text in a text editor such as Notepad. Then, save the file by using the .reg file name extension.\r\n\r\nWindows Registry Editor Version 5.00\r\n[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX}]\r\n"Compatibility Flags"=dword:00000400\r\n\r\n[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX}]\r\n"Compatibility Flags"=dword:00000400\r\n\r\nYou can apply this .reg file to individual systems by double-clicking it. You can also apply it across domains by using Group Policy. For more information about Group Policy, visit the following Microsoft Web sites:\r\n\u2022\t\r\n\r\nGroup Policy collection\r\n\u2022\t\r\n\r\nWhat is Group Policy Object Editor?\r\n\u2022\t\r\n\r\nCore Group Policy tools and settings\r\n\r\nNote You must restart Internet Explorer for your changes to take effect.\r\n\r\nImpact of Workaround. There is no impact as long as the object is not intended to be used in Internet Explorer.\r\n\r\nHow to undo the workaround. Delete the registry keys previously added in implementing this workaround.\r\n\u2022\t\r\n\r\nSet Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings for the Internet security zone to block ActiveX controls and Active Scripting. You can do this by setting your browser security to High.\r\n\r\nTo raise the browsing security level in Internet Explorer, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nOn the Internet Explorer Tools menu, click Internet Options.\r\n\r\n2.\r\n\t\r\n\r\nIn the Internet Options dialog box, click the Security tab, and then click the Internet icon.\r\n\r\n3.\r\n\t\r\n\r\nUnder Security level for this zone, move the slider to High. This sets the security level for all Web sites you visit to High.\r\n\r\nNote If no slider is visible, click Default Level, and then move the slider to High.\r\n\r\nNote Setting the level to High may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly even with the security setting set to High.\r\n\r\nImpact of workaround. There are side effects to blocking ActiveX Controls and Active Scripting. Many Web sites that are on the Internet or on an intranet use ActiveX or Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use ActiveX Controls to provide menus, ordering forms, or even account statements. Blocking ActiveX Controls or Active Scripting is a global setting that affects all Internet and intranet sites. If you do not want to block ActiveX Controls or Active Scripting for such sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nHow to undo the workaround. In Internet Options, return the slider to your previous setting or click Reset all zones to default level.\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to block ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\n\u2022\t\r\n\r\nConfigure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone. To do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Internet Options on the Tools menu.\r\n\r\n2.\r\n\t\r\n\r\nClick the Security tab.\r\n\r\n3.\r\n\t\r\n\r\nClick Internet, and then click Custom Level.\r\n\r\n4.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n5.\r\n\t\r\n\r\nClick Local intranet, and then click Custom Level.\r\n\r\n6.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n7.\r\n\t\r\n\r\nClick OK two times to return to Internet Explorer.\r\n\r\nNote Disabling Active Scripting in the Internet and Local intranet security zones may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly.\r\n\r\nImpact of workaround. There are side effects to prompting before running Active Scripting. Many Web sites that are on the Internet or on an intranet use Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use Active Scripting to provide menus, ordering forms, or even account statements. Prompting before running Active Scripting is a global setting that affects all Internet and intranet sites. You will be prompted frequently when you enable this workaround. For each prompt, if you feel you trust the site that you are visiting, click Yes to run Active Scripting. If you do not want to be prompted for all these sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nHow to undo the workaround. In Security Settings, return to your previous settings or else click Reset.\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to require a prompt before it runs ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.Click OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\nTop of sectionTop of section\r\n\t\r\nFAQ for Microsoft Internet Explorer 8 Developer Tools Vulnerability- CVE-2010-0811\r\n\r\nWhat is the scope of the vulnerability? \r\nThis is a remote code execution vulnerability. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.\r\n\r\nIf a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\r\n\r\nWhat causes the vulnerability? \r\nWhen the ActiveX control is used in Internet Explorer, the control may corrupt the system state in such a way that an attacker could execute arbitrary code.\r\n\r\nWhat might an attacker use the vulnerability to do? \r\nAn attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\r\n\r\nHow could an attacker exploit the vulnerability? \r\nAn attacker could host a specially crafted Web site that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the Web site. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. This can also include compromised Web sites and Web sites that accept or host user-provided content or advertisements. These Web sites could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger request that takes users to the attacker's Web site. It could also be possible to display specially crafted Web content by using banner advertisements or by using other methods to deliver Web content to affected systems.\r\n\r\nWhat is the component affected by the vulnerability? \r\nThe vulnerability affects the Microsoft Internet Explorer 8 Developer Tools control.\r\n\r\nAre the downloadable Developer Tools for Internet Explorer 6 and Internet Explorer 7 affected by this issue? \r\nNo, the downloadable Developer Tools for Internet Explorer 6 and Internet Explorer 7 are not affected by this issue.\r\n\r\nWhat are the Microsoft Internet Explorer 8 Developer Tools? \r\nThe Microsoft Internet Explorer 8 Developer Tools enables Web site developers to quickly debug Microsoft Jscript, investigate behavior specific to Internet Explorer, or prototype new designs or solutions on-the-fly. For more information about the IE8 Tools, see the MSDN article, Discovering Internet Explorer Developer Tools.\r\n\r\nWhat systems are primarily at risk from the vulnerability? \r\nThis vulnerability in the Microsoft Internet Explorer 8 Developer Tools control requires that a user be logged on and visiting a Web site for any malicious action to occur. Therefore, any systems where the Microsoft Internet Explorer 8 Developer Tools control is installed and where Internet Explorer is used frequently, such as workstations or terminal servers, are at the most risk from this vulnerability.\r\n\r\nWhat does the update do? \r\nThe update disables the Microsoft ActiveX controls by setting the kill bit for the Class Identifiers hosted in the library files listed below:\r\nClass Identifier\tFile\tDescription\r\n\r\n{8fe85d00-4647-40b9-87e4-5eb8a52f4759}\r\n\t\r\n\r\niedvtool.dll\r\n\t\r\n\r\nMicrosoft Internet Explorer 8 Developer Tools\r\n\r\nWhen this security bulletin was issued, had this vulnerability been publicly disclosed? \r\nNo. Microsoft received information about this vulnerability through responsible disclosure.\r\n\r\nWhen this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited? \r\nNo. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers and had not seen any examples of proof of concept code published when this security bulletin was originally issued.\r\nTop of sectionTop of section\r\nTop of sectionTop of section\r\n\t\r\nThird-Party Kill Bits\r\n\r\nThis update includes kill bits to prevent the following ActiveX controls from being run in Internet Explorer:\r\n\u2022\t\r\n\r\nDanske Bank has requested a kill bit for an ActiveX control, Danske eSec. If you have any questions or concerns regarding the Danske eSec ActiveX control, please contact Danske Bank. The class identifier (CLSID) for this ActiveX control is:\r\n\u2022\t\r\n\r\n{F6A56D95-A3A3-11D2-AC26-400000058481}\r\n\u2022\t\r\n\r\nCA has released a security advisory regarding an advisory for an ActiveX control, PSFormX in the Pest Scan product. Please see the security bulletin from CA for more information. This kill bit is being set at the request of the owner of the ActiveX control. The class identifier (CLSID) for this ActiveX control is:\r\n\u2022\t\r\n\r\n{56393399-041A-4650-94C7-13DFCB1F4665}\r\n\u2022\t\r\n\r\nEastman Kodak Company has requested a kill bit for the ActiveX control for the "Ofoto Upload Manager / Kodak Gallery Easy Upload Manager ActiveX Control". Eastman Kodak Gallery has provided the following page to provide a variety of upload options: http://www.kodakgallery.com/gallery/photo-service/upload-photos.jsp. The replacement control for the control for which the kill bit is being set in this update can be found here: http://classic.kodakgallery.com/UploadChoicesAll.jsp. If you have any questions or concerns regarding this kill bit, please contact Kodak Gallery at http://www.kodakgallery.com/gallery/footerLinksContent.jsp?pageID=600002. The class identifiers (CLSID) for this ActiveX control are:\r\n\u2022\t\r\n\r\n{6f750200-1362-4815-a476-88533de61d0c}\r\n\u2022\t\r\n\r\n{6f750201-1362-4815-a476-88533de61d0c}\r\n\u2022\t\r\n\r\nAvaya has requested a kill bit for CallPilot Unified Messaging. If you have any questions or concerns regarding the kill bit for CallPilot Unified Messaging, please contact Avaya security at securityalerts@avaya.com. The class identifier (CLSID) for this ActiveX control is:\r\n\u2022\t\r\n\r\n{7F14A9EE-6989-11D5-8152-00C04F191FCA}\r\n\r\nOther Information\r\nAcknowledgments\r\n\r\nMicrosoft thanks the following for working with us to help protect customers:\r\n\u2022\t\r\n\r\nShaun Colley of NGS Software for reporting the Microsoft Data Analyzer ActiveX Control Vulnerability (CVE-2010-0252)\r\n\u2022\t\r\n\r\nChris Ries of Carnegie Mellon University Computing Services for reporting the Microsoft internet Explorer 8 Developer Tools Vulnerability (CVE-2010-0811)\r\nTop of sectionTop of section\r\nMicrosoft Active Protections Program (MAPP)\r\n\r\nTo improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please visit the active protections Web sites provided by program partners, listed in Microsoft Active Protections Program (MAPP) Partners.\r\n\r\nSupport\r\n\u2022\t\r\n\r\nCustomers in the U.S. and Canada can receive technical support from Security Support or 1-866-PCSAFETY. There is no charge for support calls that are associated with security updates. For more information about available support options, see Microsoft Help and Support.\r\n\u2022\t\r\n\r\nInternational customers can receive support from their local Microsoft subsidiaries. There is no charge for support that is associated with security updates. For more information about how to contact Microsoft for support issues, visit the International Support Web site.\r\n\r\nDisclaimer\r\n\r\nThe information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.\r\n\r\nRevisions\r\n\u2022\t\r\n\r\nV1.0 (June 8, 2010): Bulletin published.", "modified": "2010-06-08T00:00:00", "published": "2010-06-08T00:00:00", "id": "SECURITYVULNS:DOC:24013", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:24013", "title": "Microsoft Security Bulletin MS10-034 - Critical Cumulative Security Update of ActiveX Kill Bits (980195)", "type": "securityvulns", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:37", "bulletinFamily": "software", "description": "No description provided", "modified": "2010-06-09T00:00:00", "published": "2010-06-09T00:00:00", "id": "SECURITYVULNS:VULN:10911", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:10911", "title": "Code execution with multiple ActiveX components in Microsoft Windows", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "seebug": [{"lastseen": "2017-11-19T18:23:30", "bulletinFamily": "exploit", "description": "BUGTRAQ ID: 38045\r\nCVE ID: CVE-2010-0252\r\n\r\nMicrosoft Data Analyzer ActiveX\u63a7\u4ef6\u5141\u8bb8\u4ece\u57fa\u4e8eCOM\u7684\u5f00\u53d1\u5e94\u7528\u7a0b\u5e8f\uff08\u5982Visual Basic\uff09\u4ee5\u7f16\u7a0b\u65b9\u5f0f\u63a7\u5236Data Analyzer\u3002\r\n\r\n\u5728Internet Explorer\u4e2d\u5b9e\u4f8b\u5316Microsoft Data Analyzer ActiveX\u63a7\u4ef6\uff08max3activex.dll\uff09\u65f6\uff0c\u8be5\u63a7\u4ef6\u53ef\u80fd\u4f1a\u7834\u574f\u6808\u72b6\u6001\uff0c\u5bfc\u81f4\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\n\nMicrosoft Windows XP SP3\r\nMicrosoft Windows XP SP2\r\nMicrosoft Windows Vista SP2\r\nMicrosoft Windows Vista SP1\r\nMicrosoft Windows Vista\r\nMicrosoft Windows Server 2008 SP2\r\nMicrosoft Windows Server 2008 R2\r\nMicrosoft Windows Server 2008\r\nMicrosoft Windows Server 2003 SP2\r\nMicrosoft Windows 7\r\nMicrosoft Windows 2000SP4\n\u4e34\u65f6\u89e3\u51b3\u65b9\u6cd5\uff1a\r\n\r\n* \u5c06Internet Explorer\u914d\u7f6e\u4e3a\u5728Internet\u548c\u672c\u5730Intranet\u5b89\u5168\u533a\u57df\u4e2d\u8fd0\u884cActiveX\u63a7\u4ef6\u548c\u6d3b\u52a8\u811a\u672c\u4e4b\u524d\u8fdb\u884c\u63d0\u793a\u3002\r\n \r\n* \u5c06Internet \u548c\u672c\u5730Intranet\u5b89\u5168\u533a\u57df\u8bbe\u7f6e\u8bbe\u4e3a\u201c\u9ad8\u201d\uff0c\u4ee5\u4fbf\u5728\u8fd9\u4e9b\u533a\u57df\u4e2d\u8fd0\u884cActiveX\u63a7\u4ef6\u548c\u6d3b\u52a8\u811a\u672c\u4e4b\u524d\u8fdb\u884c\u63d0\u793a\u3002\r\n\r\n* \u7981\u6b62\u5728Internet Explorer\u4e2d\u8fd0\u884cCOM\u5bf9\u8c61\u3002\r\n\r\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nMicrosoft\r\n---------\r\nMicrosoft\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08MS10-008\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nMS10-008\uff1aCumulative Security Update of ActiveX Kill Bits (978262)\r\n\u94fe\u63a5\uff1ahttp://www.microsoft.com/technet/security/Bulletin/MS10-008.mspx?pf=true", "modified": "2010-02-20T00:00:00", "published": "2010-02-20T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-19149", "id": "SSV:19149", "type": "seebug", "title": "Microsoft Data Analyzer ActiveX\u63a7\u4ef6\u6808\u7834\u574f\u6f0f\u6d1e\uff08MS10-008\uff09", "sourceData": "", "sourceHref": "", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-11-19T18:07:11", "bulletinFamily": "exploit", "description": "Bugraq ID: 38045\r\nCVE ID\uff1aCVE-2010-0252\r\nCNCVE ID\uff1aCNCVE-20100252\r\n\r\nMicrosoft Data Analyzer\u662f\u4e00\u6b3e\u7528\u4e8eMicrosoft Office\u7684\u6570\u636e\u5206\u6790\u8f6f\u4ef6\u3002\r\nMicrosoft Data Analyzer ActiveX control (max3activex.dll)\u5b58\u5728\u4e00\u4e2a\u672a\u660e\u9519\u8bef\uff0c\u6784\u5efa\u6076\u610fWEB\u9875\uff0c\u8bf1\u4f7f\u7528\u6237\u8bbf\u95ee\uff0c\u53ef\u5bfc\u81f4\u7cfb\u7edf\u72b6\u6001\u7834\u574f\uff0c\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\n\nMicrosoft Windows XP Tablet PC Edition SP3\r\nMicrosoft Windows XP Tablet PC Edition SP2\r\nMicrosoft Windows XP Tablet PC Edition SP1\r\nMicrosoft Windows XP Tablet PC Edition\r\nMicrosoft Windows XP Professional x64 Edition SP3\r\nMicrosoft Windows XP Professional x64 Edition SP2\r\nMicrosoft Windows XP Professional x64 Edition\r\nMicrosoft Windows XP Professional SP3\r\nMicrosoft Windows XP Professional SP2\r\nMicrosoft Windows XP Professional SP1\r\nMicrosoft Windows XP Professional\r\nMicrosoft Windows XP Media Center Edition SP3\r\nMicrosoft Windows XP Media Center Edition SP2\r\nMicrosoft Windows XP Media Center Edition SP1\r\nMicrosoft Windows XP Media Center Edition\r\nMicrosoft Windows XP Home SP3\r\nMicrosoft Windows XP Home SP2\r\nMicrosoft Windows XP Home SP1\r\nMicrosoft Windows XP 64-bit Edition SP1\r\nMicrosoft Windows XP 64-bit Edition\r\nMicrosoft Windows XP 0\r\nMicrosoft Windows Vista x64 Edition SP2\r\nMicrosoft Windows Vista x64 Edition SP1\r\nMicrosoft Windows Vista x64 Edition 0\r\nMicrosoft Windows Vista Ultimate 64-bit edition SP2\r\nMicrosoft Windows Vista Ultimate 64-bit edition SP1\r\nMicrosoft Windows Vista Ultimate 64-bit edition 0\r\nMicrosoft Windows Vista Home Premium 64-bit edition SP2\r\nMicrosoft Windows Vista Home Premium 64-bit edition SP1\r\nMicrosoft Windows Vista Home Premium 64-bit edition 0\r\nMicrosoft Windows Vista Home Basic 64-bit edition SP2\r\nMicrosoft Windows Vista Home Basic 64-bit edition SP1\r\nMicrosoft Windows Vista Home Basic 64-bit edition 0\r\nMicrosoft Windows Vista Enterprise 64-bit edition SP2\r\nMicrosoft Windows Vista Enterprise 64-bit edition SP1\r\nMicrosoft Windows Vista Enterprise 64-bit edition 0\r\nMicrosoft Windows Vista Business 64-bit edition SP2\r\nMicrosoft Windows Vista Business 64-bit edition SP1\r\nMicrosoft Windows Vista Business 64-bit edition 0\r\nMicrosoft Windows Vista Ultimate SP2\r\nMicrosoft Windows Vista Ultimate SP1\r\nMicrosoft Windows Vista Ultimate\r\nMicrosoft Windows Vista SP2\r\nMicrosoft Windows Vista SP1\r\nMicrosoft Windows Vista Home Premium SP2\r\nMicrosoft Windows Vista Home Premium SP1\r\nMicrosoft Windows Vista Home Premium\r\nMicrosoft Windows Vista Home Basic SP2\r\nMicrosoft Windows Vista Home Basic SP1\r\nMicrosoft Windows Vista Home Basic\r\nMicrosoft Windows Vista Enterprise SP2\r\nMicrosoft Windows Vista Enterprise SP1\r\nMicrosoft Windows Vista Business SP2\r\nMicrosoft Windows Vista Business SP1\r\nMicrosoft Windows Vista Business\r\nMicrosoft Windows Vista 0\r\nMicrosoft Windows Server 2008 Standard Edition SP2\r\nMicrosoft Windows Server 2008 Standard Edition Release Candidate\r\nMicrosoft Windows Server 2008 Standard Edition 0\r\nMicrosoft Windows Server 2008 R2 Datacenter 0\r\nMicrosoft Windows Server 2008 for x64-based Systems SP2\r\nMicrosoft Windows Server 2008 for x64-based Systems R2\r\nMicrosoft Windows Server 2008 for x64-based Systems 0\r\nMicrosoft Windows Server 2008 for Itanium-based Systems SP2\r\nMicrosoft Windows Server 2008 for Itanium-based Systems R2\r\nMicrosoft Windows Server 2008 for Itanium-based Systems 0\r\nMicrosoft Windows Server 2008 for 32-bit Systems SP2\r\nMicrosoft Windows Server 2008 for 32-bit Systems 0\r\nMicrosoft Windows Server 2008 Enterprise Edition SP2\r\nMicrosoft Windows Server 2008 Enterprise Edition 0\r\nMicrosoft Windows Server 2008 Datacenter Edition SP2\r\nMicrosoft Windows Server 2008 Datacenter Edition 0\r\nMicrosoft Windows Server 2003 x64 SP2\r\nMicrosoft Windows Server 2003 x64 SP1\r\nMicrosoft Windows Server 2003 Web Edition SP2\r\nMicrosoft Windows Server 2003 Web Edition SP1\r\nMicrosoft Windows Server 2003 Web Edition\r\nMicrosoft Windows Server 2003 Standard Edition SP2\r\nMicrosoft Windows Server 2003 Standard Edition SP1\r\nMicrosoft Windows Server 2003 Standard Edition\r\nMicrosoft Windows Server 2003 Itanium SP2\r\nMicrosoft Windows Server 2003 Itanium SP1\r\nMicrosoft Windows Server 2003 Itanium 0\r\nMicrosoft Windows Server 2003 Enterprise Edition Itanium SP1\r\nMicrosoft Windows Server 2003 Enterprise Edition Itanium 0\r\nMicrosoft Windows Server 2003 Enterprise Edition SP1\r\nMicrosoft Windows Server 2003 Enterprise Edition\r\nMicrosoft Windows Server 2003 Datacenter x64 Edition\r\nMicrosoft Windows Server 2003 Datacenter Edition Itanium SP1\r\nMicrosoft Windows Server 2003 Datacenter Edition Itanium 0\r\nMicrosoft Windows Server 2003 Datacenter Edition SP1\r\nMicrosoft Windows Server 2003 Datacenter Edition\r\nMicrosoft Windows 7 for x64-based Systems 0\r\nMicrosoft Windows 7 for 32-bit Systems 0\r\nMicrosoft Windows 2000 Server SP4\r\nMicrosoft Windows 2000 Server SP3\r\nMicrosoft Windows 2000 Server SP2\r\nMicrosoft Windows 2000 Server SP1\r\nMicrosoft Windows 2000 Server\r\n+ Avaya DefinityOne Media Servers\r\n+ Avaya IP600 Media Servers\r\n+ Avaya S3400 Message Application Server 0\r\n+ Avaya S8100 Media Servers 0\r\nMicrosoft Windows 2000 Professional SP4\r\nMicrosoft Windows 2000 Professional SP3\r\nMicrosoft Windows 2000 Professional SP2\r\nMicrosoft Windows 2000 Professional SP1\r\nMicrosoft Windows 2000 Professional\r\nMicrosoft Windows 2000 Datacenter Server SP4\r\nMicrosoft Windows 2000 Datacenter Server SP3\r\nMicrosoft Windows 2000 Datacenter Server SP2\r\nMicrosoft Windows 2000 Datacenter Server SP1\r\nMicrosoft Windows 2000 Datacenter Server\r\nMicrosoft Windows 2000 Advanced Server SP4\r\nMicrosoft Windows 2000 Advanced Server SP3\r\nMicrosoft Windows 2000 Advanced Server SP2\r\nMicrosoft Windows 2000 Advanced Server SP1\r\nMicrosoft Windows 2000 Advanced Server\r\nAvaya Messaging Application Server MM 3.1\r\nAvaya Messaging Application Server MM 3.0\r\nAvaya Messaging Application Server MM 2.0\r\nAvaya Messaging Application Server MM 1.1\r\nAvaya Messaging Application Server 0\r\nAvaya Meeting Exchange - Webportal 0\r\nAvaya Meeting Exchange - Web Conferencing Server 0\r\nAvaya Meeting Exchange - Streaming Server 0\r\nAvaya Meeting Exchange - Recording Server 0\r\nAvaya Meeting Exchange - Client Registration Server 0\r\n3DM Software Disk Management Software SP2\r\n3DM Software Disk Management Software SP1\n\u5382\u5546\u89e3\u51b3\u65b9\u6848\r\n\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nMicrosoft Windows XP Media Center Edition SP2\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows XP (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=8c3f2e81-c0ea -494a-a47c-4f8982effb49\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows XP (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=7bcf3945-0552 -478e-b7f3-bbca97dd1b5d\r\nMicrosoft Windows Server 2008 for 32-bit Systems SP2\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows Server 2008 (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=a06b9f42-47ac -4ff2-ac32-e4958cdb611e\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows Server 2008 (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=9a85b1bf-7427 -47d0-9e1b-21dbe824a62c\r\nMicrosoft Windows Server 2008 for x64-based Systems R2\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows Server 2008 R2 x64 Edition (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=901f7c89-02af -4f87-8592-dad318997d77\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows Server 2008 R2 x64 Edition (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=cda31c54-8b81 -4185-a623-64480ad4b73c\r\nMicrosoft Windows Vista x64 Edition 0\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows Vista for x64-based Systems (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=f349f7aa-d020 -4e0d-a35f-518a63ec92df\r\nMicrosoft Windows XP Tablet PC Edition SP2\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows XP (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=7bcf3945-0552 -478e-b7f3-bbca97dd1b5d\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows XP (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=8c3f2e81-c0ea -494a-a47c-4f8982effb49\r\nMicrosoft Windows XP Media Center Edition SP3\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows XP (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=7bcf3945-0552 -478e-b7f3-bbca97dd1b5d\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows XP (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=8c3f2e81-c0ea -494a-a47c-4f8982effb49\r\nMicrosoft Windows 7 for 32-bit Systems 0\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows 7 (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=5bce87fe-dcbb -4638-b248-3f0755537b00\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows 7 (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=ec6d996f-dffa -45ad-9467-e96a4ac63e5f\r\nMicrosoft Windows Server 2003 Web Edition SP2\r\nMicrosoft Security Update for ActiveX Killbits for Windows Server 2003 (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=3c0bd349-aa77 -47de-ba1d-1fcc72dcad28\r\nMicrosoft Security Update for ActiveX Killbits for Windows Server 2003 (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=29ff72f7-1663 -4f35-a794-2dfe3c17b39c\r\nMicrosoft Windows XP Professional x64 Edition SP2\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows XP x64 Edition (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyId=25ef97e8-e76e -44c2-953c-f94cbac552cf\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows XP x64 Edition (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyId=f3e462fb-df95 -4b79-a8bc-5359c2967503\r\nMicrosoft Windows Vista 0\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows Vista (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=2c897ddd-f441 -41d4-b5b4-d794cfc96e6b\r\nMicrosoft Windows Server 2003 x64 SP2\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows Server 2003 x64 Edition (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=d4a97bb7-4f74 -4884-9a6e-7a4df9c540fb\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows Server 2003 x64 Edition (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=4aa0ec4f-5502 -4f2a-9732-975518c34444\r\nMicrosoft Windows Vista x64 Edition SP1\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows Vista for x64-based Systems (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=ddf55e74-dbaa -45f7-ac5b-ae3da24e0e33\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows Vista for x64-based Systems (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=f349f7aa-d020 -4e0d-a35f-518a63ec92df\r\nMicrosoft Windows XP Tablet PC Edition SP3\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows XP (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=7bcf3945-0552 -478e-b7f3-bbca97dd1b5d\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows XP (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=8c3f2e81-c0ea -494a-a47c-4f8982effb49\r\nMicrosoft Windows Vista SP1\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows Vista (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=2ddaa4b3-1a98 -4183-94af-ebdae4e7b76a\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows Vista (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=2c897ddd-f441 -41d4-b5b4-d794cfc96e6b\r\nMicrosoft Windows Server 2008 for x64-based Systems 0\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows Server 2008 x64 Edition (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=fde218c3-90ab -4664-852d-25ca55835054\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows Server 2008 x64 Edition (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=6d0a3f7c-2617 -4bc6-a4c7-cda26c6471e1\r\nMicrosoft Windows Server 2008 for Itanium-based Systems SP2\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows Server 2008 for Itanium-based Systems (K\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=38347fa6-5946 -4bb5-9fea-a5b2f4e7c1f2\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows Server 2008 for Itanium-based Systems (K\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=5b6e9451-df38 -4626-bb1d-4fc160d7a40e\r\nMicrosoft Windows 2000 Advanced Server SP4\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows 2000 (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=543dc6a7-fa76 -4ba9-81e4-25fdf2013548\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows 2000 (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=d3955983-0079 -476e-a488-99713097259c\r\n3DM Software Disk Management Software SP2\r\nMicrosoft Security Update for ActiveX Killbits for Windows Server 2003 (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=3c0bd349-aa77 -47de-ba1d-1fcc72dcad28\r\nMicrosoft Security Update for ActiveX Killbits for Windows Server 2003 (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=29ff72f7-1663 -4f35-a794-2dfe3c17b39c\r\nMicrosoft Windows 7 for x64-based Systems 0\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows 7 for x64-based Systems (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=b3265576-04c1 -48b1-8ce9-128843c58cf5\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows 7 for x64-based Systems (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=ee68ecd0-5b8a -4c1e-bdee-bd8616558d43\r\nMicrosoft Windows Server 2003 Standard Edition SP2\r\nMicrosoft Security Update for ActiveX Killbits for Windows Server 2003 (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=3c0bd349-aa77 -47de-ba1d-1fcc72dcad28\r\nMicrosoft Security Update for ActiveX Killbits for Windows Server 2003 (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=29ff72f7-1663 -4f35-a794-2dfe3c17b39c\r\nMicrosoft Windows XP Home SP2\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows XP (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=7bcf3945-0552 -478e-b7f3-bbca97dd1b5d\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows XP (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=8c3f2e81-c0ea -494a-a47c-4f8982effb49\r\nMicrosoft Windows Server 2008 for x64-based Systems SP2\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows Server 2008 x64 Edition (KB980195)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=6d0a3f7c-2617 -4bc6-a4c7-cda26c6471e1\r\nMicrosoft Cumulative Security Update for ActiveX Killbits for Windows Server 2008 x64 Edition (KB978262)\r\nhttp://www.microsoft.com/downloads/details.aspx?FamilyID=fde218c3-90ab -4664-852d-25ca55835054", "modified": "2010-12-17T00:00:00", "published": "2010-12-17T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-20291", "id": "SSV:20291", "type": "seebug", "title": "Microsoft Data Analyzer 'max3activex.dll' ActiveX\u63a7\u4ef6\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e", "sourceData": "", "sourceHref": "", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2017-07-02T21:10:03", "bulletinFamily": "scanner", "description": "This host is missing a critical security update according to\n Microsoft Bulletin MS10-008.", "modified": "2017-02-20T00:00:00", "published": "2010-02-10T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=900229", "id": "OPENVAS:900229", "title": "Microsoft Data Analyzer ActiveX Control Vulnerability (978262)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_ms10-008.nasl 5361 2017-02-20 11:57:13Z cfi $\n#\n# Microsoft Data Analyzer ActiveX Control Vulnerability (978262)\n#\n# Authors:\n# Veerendra GG <veerendragg@secpod.com>\n#\n# Updated By: Madhuri D <dmadhuri@secpod.com> on 2010-11-22\n# - To confirm Vulnerability on vista, win 2008 and win 7\n#\n# Copyright:\n# Copyright (c) 2010 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_solution = \"Run Windows Update and update the listed hotfixes or download and\n update mentioned hotfixes in the advisory from the below link,\n http://www.microsoft.com/technet/security/bulletin/ms10-008.mspx\n\n Workaround:\n Set the killbit for the following CLSIDs,\n {E0ECA9C3-D669-4EF4-8231-00724ED9288F}, {C05A1FBC-1413-11D1-B05F-00805F4945F6},\n {5D80A6D1-B500-47DA-82B8-EB9875F85B4D}, {0CCA191D-13A6-4E29-B746-314DEE697D83},\n {2d8ed06d-3c30-438b-96ae-4d110fdc1fb8}\n http://support.microsoft.com/kb/240797\";\n\ntag_impact = \"Successful exploitation will let the remote attackers execute arbitrary code\n and can compromise a vulnerable system.\n Impact Level: System.\";\ntag_affected = \"Micorsoft Windows 7\n Microsoft Windows 2K Service Pack 4 and prior\n Microsoft Windows XP Service Pack 3 and prior\n Microsoft Windows 2K3 Service Pack 2 and prior\n Microsoft Windows Vista Service Pack 1/2 and prior.\n Microsoft Windows Server 2008 Service Pack 1/2 and prior.\";\ntag_insight = \"An unspecified error exists in the Microsoft Data Analyzer ActiveX control\n (max3activex.dll) when used with Internet Explorer. Attackers can execute\n arbitrary code by tricking a user into visiting a specially crafted web page.\";\ntag_summary = \"This host is missing a critical security update according to\n Microsoft Bulletin MS10-008.\";\n\nif(description)\n{\n script_id(900229);\n script_version(\"$Revision: 5361 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-20 12:57:13 +0100 (Mon, 20 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-02-10 16:06:43 +0100 (Wed, 10 Feb 2010)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2010-0252\");\n script_name(\"Microsoft Data Analyzer ActiveX Control Vulnerability (978262)\");\n\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/38503/\");\n script_xref(name : \"URL\" , value : \"http://www.vupen.com/english/advisories/2010/0341\");\n script_xref(name : \"URL\" , value : \"http://www.microsoft.com/technet/security/bulletin/ms10-008.mspx\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2010 SecPod\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"secpod_reg_enum.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"secpod_activex.inc\");\n\n## Check For OS and Service Packs\nif(hotfix_check_sp(win2k:5, xp:4, win2003:3, winVista:3, win2008:3, win7:1) <= 0){\n exit(0);\n}\n\n## MS10-008 Hotfix check\nif(hotfix_missing(name:\"978262\") == 0){\n exit(0);\n}\n\n## CLSID List\nclsids = make_list(\n \"{E0ECA9C3-D669-4EF4-8231-00724ED9288F}\", \"{C05A1FBC-1413-11D1-B05F-00805F4945F6}\",\n \"{5D80A6D1-B500-47DA-82B8-EB9875F85B4D}\", \"{0CCA191D-13A6-4E29-B746-314DEE697D83}\",\n \"{2d8ed06d-3c30-438b-96ae-4d110fdc1fb8}\");\n\nforeach clsid (clsids)\n{\n ## Check if Kill-Bit is set for ActiveX control\n if(is_killbit_set(clsid:clsid) == 0)\n {\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-11-30T21:33:34", "bulletinFamily": "scanner", "description": "This host is missing a critical security update according to\n Microsoft Bulletin MS10-008.", "modified": "2018-11-30T00:00:00", "published": "2010-02-10T00:00:00", "id": "OPENVAS:1361412562310900229", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310900229", "title": "Microsoft Data Analyzer ActiveX Control Vulnerability (978262)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_ms10-008.nasl 12602 2018-11-30 14:36:58Z cfischer $\n#\n# Microsoft Data Analyzer ActiveX Control Vulnerability (978262)\n#\n# Authors:\n# Veerendra GG <veerendragg@secpod.com>\n#\n# Updated By: Madhuri D <dmadhuri@secpod.com> on 2010-11-22\n# - To confirm Vulnerability on vista, win 2008 and win 7\n#\n# Copyright:\n# Copyright (c) 2010 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.900229\");\n script_version(\"$Revision: 12602 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-30 15:36:58 +0100 (Fri, 30 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-02-10 16:06:43 +0100 (Wed, 10 Feb 2010)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2010-0252\");\n script_name(\"Microsoft Data Analyzer ActiveX Control Vulnerability (978262)\");\n\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/38503/\");\n script_xref(name:\"URL\", value:\"http://www.vupen.com/english/advisories/2010/0341\");\n script_xref(name:\"URL\", value:\"http://www.microsoft.com/technet/security/bulletin/ms10-008.mspx\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2010 SecPod\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"secpod_reg_enum.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/registry_enumerated\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will let the remote attackers execute arbitrary code\n and can compromise a vulnerable system.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Windows 7\n\n Microsoft Windows 2K Service Pack 4 and prior\n\n Microsoft Windows XP Service Pack 3 and prior\n\n Microsoft Windows 2K3 Service Pack 2 and prior\n\n Microsoft Windows Vista Service Pack 1/2 and prior.\n\n Microsoft Windows Server 2008 Service Pack 1/2 and prior.\");\n\n script_tag(name:\"insight\", value:\"An unspecified error exists in the Microsoft Data Analyzer ActiveX control\n (max3activex.dll) when used with Internet Explorer. Attackers can execute\n arbitrary code by tricking a user into visiting a specially crafted web page.\");\n\n script_tag(name:\"summary\", value:\"This host is missing a critical security update according to\n Microsoft Bulletin MS10-008.\");\n\n script_tag(name:\"solution\", value:\"Run Windows Update and update the listed hotfixes or download and\n update mentioned hotfixes in the advisory.\n\n Workaround:\n Set the killbit for the following CLSIDs,\n {E0ECA9C3-D669-4EF4-8231-00724ED9288F}, {C05A1FBC-1413-11D1-B05F-00805F4945F6},\n {5D80A6D1-B500-47DA-82B8-EB9875F85B4D}, {0CCA191D-13A6-4E29-B746-314DEE697D83},\n {2d8ed06d-3c30-438b-96ae-4d110fdc1fb8}\");\n\n script_xref(name:\"URL\", value:\"http://support.microsoft.com/kb/240797\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"secpod_activex.inc\");\n\nif(hotfix_check_sp(win2k:5, xp:4, win2003:3, winVista:3, win2008:3, win7:1) <= 0){\n exit(0);\n}\n\n## MS10-008 Hotfix check\nif(hotfix_missing(name:\"978262\") == 0){\n exit(0);\n}\n\n## CLSID List\nclsids = make_list(\n \"{E0ECA9C3-D669-4EF4-8231-00724ED9288F}\", \"{C05A1FBC-1413-11D1-B05F-00805F4945F6}\",\n \"{5D80A6D1-B500-47DA-82B8-EB9875F85B4D}\", \"{0CCA191D-13A6-4E29-B746-314DEE697D83}\",\n \"{2d8ed06d-3c30-438b-96ae-4d110fdc1fb8}\");\n\nforeach clsid (clsids)\n{\n if(is_killbit_set(clsid:clsid) == 0)\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:10:00", "bulletinFamily": "scanner", "description": "This host is missing a critical security update according to\n Microsoft Bulletin MS10-034.", "modified": "2017-02-20T00:00:00", "published": "2010-06-09T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=900245", "id": "OPENVAS:900245", "title": "Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_ms10-034.nasl 5361 2017-02-20 11:57:13Z cfi $\n#\n# Description: Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)\n#\n# Authors:\n# Veerendra GG <veerendragg@secpod.com>\n#\n# Updated By: Madhuri D <dmadhuri@secpod.com> on 2010-11-16\n# - To confirm Vulnerability on vista, win 2008 and win 7\n#\n# Copyright:\n# Copyright (c) 2010 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n##############################################################################\n\ntag_solution = \"Run Windows Update and update the listed hotfixes or download and\n update mentioned hotfixes in the advisory from the below link,\n http://www.microsoft.com/technet/security/bulletin/MS10-034.mspx\n\n Workaround:\n Set the killbit for the following CLSIDs,\n {14FD1463-1F3F-4357-9C03-2080B442F503},{E9CB13DB-20AB-43C5-B283-977C58FB5754}\n {8fe85d00-4647-40b9-87e4-5eb8a52f4759}\n http://support.microsoft.com/kb/240797\";\n\ntag_impact = \"Successful exploitation will let the remote attackers execute arbitrary code.\n Impact Level: System.\";\ntag_affected = \"Micorsoft Windows 7\n Microsoft Windows 2K Service Pack 4 and prior\n Microsoft Windows XP Service Pack 3 and prior\n Microsoft Windows 2K3 Service Pack 2 and prior\n Microsoft Windows Vista Service Pack 1/2 and prior.\n Microsoft Windows Server 2008 Service Pack 1/2 and prior.\";\ntag_insight = \"An unspecified error exists in the Microsoft Data Analyzer ActiveX control\n (max3activex.dll) and Internet Explorer Developer Tools ActiveX Control\n (iedvtool.dll) when used with Internet Explorer. Attackers can execute\n arbitrary code by tricking a user into visiting a specially crafted web page.\";\ntag_summary = \"This host is missing a critical security update according to\n Microsoft Bulletin MS10-034.\";\n\nif(description)\n{\n script_id(900245);\n script_version(\"$Revision: 5361 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-20 12:57:13 +0100 (Mon, 20 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-06-09 17:19:57 +0200 (Wed, 09 Jun 2010)\");\n script_bugtraq_id(38045, 40490);\n script_cve_id(\"CVE-2010-0252\", \"CVE-2010-0811\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/38503\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/40036\");\n script_xref(name : \"URL\" , value : \"http://www.vupen.com/english/advisories/2010/1391\");\n script_xref(name : \"URL\" , value : \"http://www.microsoft.com/technet/security/bulletin/MS10-034.mspx\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2010 SecPod\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"secpod_reg_enum.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"secpod_activex.inc\");\n\n## Check For OS and Service Packs\nif(hotfix_check_sp(win2k:5, xp:4, win2003:3, winVista:3, win7:1, win2008:3) <= 0){\n exit(0);\n}\n\n## MS10-034 Hotfix check\nif(hotfix_missing(name:\"980195\") == 0){\n exit(0);\n}\n\n## CLSID List\nclsids = make_list(\n \"{14FD1463-1F3F-4357-9C03-2080B442F503}\",\n \"{E9CB13DB-20AB-43C5-B283-977C58FB5754}\",\n \"{8fe85d00-4647-40b9-87e4-5eb8a52f4759}\"\n );\n\nforeach clsid (clsids)\n{\n ## Check if Kill-Bit is set for ActiveX control\n if(is_killbit_set(clsid:clsid) == 0)\n {\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-11-30T21:33:31", "bulletinFamily": "scanner", "description": "This host is missing a critical security update according to\n Microsoft Bulletin MS10-034.", "modified": "2018-11-30T00:00:00", "published": "2010-06-09T00:00:00", "id": "OPENVAS:1361412562310900245", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310900245", "title": "Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_ms10-034.nasl 12602 2018-11-30 14:36:58Z cfischer $\n#\n# Description: Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)\n#\n# Authors:\n# Veerendra GG <veerendragg@secpod.com>\n#\n# Updated By: Madhuri D <dmadhuri@secpod.com> on 2010-11-16\n# - To confirm Vulnerability on vista, win 2008 and win 7\n#\n# Copyright:\n# Copyright (c) 2010 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n##############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.900245\");\n script_version(\"$Revision: 12602 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-30 15:36:58 +0100 (Fri, 30 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-06-09 17:19:57 +0200 (Wed, 09 Jun 2010)\");\n script_bugtraq_id(38045, 40490);\n script_cve_id(\"CVE-2010-0252\", \"CVE-2010-0811\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/38503\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/40036\");\n script_xref(name:\"URL\", value:\"http://www.vupen.com/english/advisories/2010/1391\");\n script_xref(name:\"URL\", value:\"http://www.microsoft.com/technet/security/bulletin/MS10-034.mspx\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2010 SecPod\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"secpod_reg_enum.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/registry_enumerated\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will let the remote attackers execute arbitrary code.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Windows 7\n\n Microsoft Windows 2K Service Pack 4 and prior\n\n Microsoft Windows XP Service Pack 3 and prior\n\n Microsoft Windows 2K3 Service Pack 2 and prior\n\n Microsoft Windows Vista Service Pack 1/2 and prior.\n\n Microsoft Windows Server 2008 Service Pack 1/2 and prior.\");\n\n script_tag(name:\"insight\", value:\"An unspecified error exists in the Microsoft Data Analyzer ActiveX control\n (max3activex.dll) and Internet Explorer Developer Tools ActiveX Control\n (iedvtool.dll) when used with Internet Explorer. Attackers can execute\n arbitrary code by tricking a user into visiting a specially crafted web page.\");\n\n script_tag(name:\"summary\", value:\"This host is missing a critical security update according to\n Microsoft Bulletin MS10-034.\");\n\n script_tag(name:\"solution\", value:\"Run Windows Update and update the listed hotfixes or download and\n update mentioned hotfixes in the referenced advisory.\n\n Workaround:\n Set the killbit for the following CLSIDs,\n {14FD1463-1F3F-4357-9C03-2080B442F503}, {E9CB13DB-20AB-43C5-B283-977C58FB5754}\n {8fe85d00-4647-40b9-87e4-5eb8a52f4759}\");\n\n script_xref(name:\"URL\", value:\"http://support.microsoft.com/kb/240797\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"secpod_activex.inc\");\n\nif(hotfix_check_sp(win2k:5, xp:4, win2003:3, winVista:3, win7:1, win2008:3) <= 0){\n exit(0);\n}\n\n## MS10-034 Hotfix check\nif(hotfix_missing(name:\"980195\") == 0){\n exit(0);\n}\n\n## CLSID List\nclsids = make_list(\n \"{14FD1463-1F3F-4357-9C03-2080B442F503}\",\n \"{E9CB13DB-20AB-43C5-B283-977C58FB5754}\",\n \"{8fe85d00-4647-40b9-87e4-5eb8a52f4759}\"\n );\n\nforeach clsid (clsids)\n{\n if(is_killbit_set(clsid:clsid) == 0)\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2019-02-21T01:13:01", "bulletinFamily": "scanner", "description": "The Microsoft Data Analyzer ActiveX control has a remote code execution vulnerability. The system may also have one or more vulnerable third-party ActiveX controls installed.\n\nA remote attacker could exploit these issues by tricking a user into requesting a maliciously crafted web page, resulting in arbitrary code execution.", "modified": "2018-11-15T00:00:00", "id": "SMB_NT_MS10-008.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=44418", "published": "2010-02-09T00:00:00", "title": "MS10-008: Cumulative Security Update of ActiveX Kill Bits (978262)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n\ninclude(\"compat.inc\");\n\n\nif (description)\n{\n script_id(44418);\n script_version(\"1.31\");\n script_cvs_date(\"Date: 2018/11/15 20:50:30\");\n\n script_cve_id(\"CVE-2009-2570\", \"CVE-2009-3735\", \"CVE-2010-0252\");\n script_bugtraq_id(34766, 38045, 38060, 38066, 38067);\n script_xref(name:\"MSFT\", value:\"MS10-008\");\n script_xref(name:\"MSKB\", value:\"978262\");\n\n script_name(english:\"MS10-008: Cumulative Security Update of ActiveX Kill Bits (978262)\");\n script_summary(english:\"Checks if several kill bits have been set\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Windows host is missing an update that disables selected\nActiveX controls.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The Microsoft Data Analyzer ActiveX control has a remote code\nexecution vulnerability. The system may also have one or more\nvulnerable third-party ActiveX controls installed.\n\nA remote attacker could exploit these issues by tricking a user into\nrequesting a maliciously crafted web page, resulting in arbitrary code\nexecution.\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2010/ms10-008\");\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Microsoft has released a set of patches for Windows 2000, XP, 2003,\nVista, 2008, and 7.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(94, 119);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/04/29\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/02/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/02/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, 'Host/patch_management_checks');\n\n exit(0);\n}\n\n\ninclude(\"smb_func.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_activex_func.inc\");\n\n\ninclude(\"misc_func.inc\");\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS10-008';\nkbs = make_list(\"978262\");\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\n\nif (!get_kb_item(\"SMB/Registry/Enumerated\")) exit(0, \"The registry wasn't enumerated.\");\nif (hotfix_check_sp(win2k:6, xp:4, win2003:3, vista:3, win7:1) <= 0)\n exit(0, \"The host is not affected based on its version / service pack.\");\nif (hotfix_check_server_core() == 1) exit(0, \"Windows Server Core installs are not affected.\");\nif (activex_init() != ACX_OK) exit(1, \"Unable to initialize the ActiveX API.\");\n\n\n\nkb = \"978262\";\n\n# Test each control.\ninfo = \"\";\nclsids = make_list(\n '{E0ECA9C3-D669-4EF4-8231-00724ED9288F}', # max3activex.dll\n '{C05A1FBC-1413-11D1-B05F-00805F4945F6}', # Symantec WinFax Pro 10.3\n '{5D80A6D1-B500-47DA-82B8-EB9875F85B4D}', # Google Desktop Gadget 5.8\n '{0CCA191D-13A6-4E29-B746-314DEE697D83}', # Facebook Photo Updater 5.5.8\n '{2d8ed06d-3c30-438b-96ae-4d110fdc1fb8}' # PandaActiveScan Installer 2.0\n);\n\nforeach clsid (clsids)\n{\n if (activex_get_killbit(clsid:clsid) == 0)\n {\n info += ' ' + clsid + '\\n';\n if (!thorough_tests) break;\n }\n}\nactivex_end();\n\n\nif (info)\n{\n if (report_verbosity > 0)\n {\n if (max_index(split(info)) > 1) s = \"s\";\n else s = \"\";\n\n report =\n '\\nThe kill bit has not been set for the following control'+s+' :\\n\\n'+\n info;\n\n if (!thorough_tests)\n {\n report +=\n '\\nNote that Nessus did not check whether there were other kill bits\\n'+\n 'that have not been set because the \"Perform thorough tests\" setting\\n'+\n 'was not enabled when this scan was run.\\n';\n }\n hotfix_add_report(info, bulletin:bulletin, kb:kb);\n }\n hotfix_security_warning();\n\n set_kb_item(name:\"SMB/Missing/\"+bulletin, value:TRUE);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:13:26", "bulletinFamily": "scanner", "description": "The Microsoft Data Analyzer ActiveX control has a remote code execution vulnerability. The system may also have one or more vulnerable third-party ActiveX controls installed.\n\nA remote attacker could exploit these issues by tricking a user into requesting a maliciously crafted web page, resulting in arbitrary code execution.", "modified": "2018-11-15T00:00:00", "id": "SMB_NT_MS10-034.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=46841", "published": "2010-06-09T00:00:00", "title": "MS10-034: Cumulative Security Update of ActiveX Kill Bits (980195)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n\ninclude(\"compat.inc\");\n\n\nif (description)\n{\n script_id(46841);\n script_version(\"1.30\");\n script_cvs_date(\"Date: 2018/11/15 20:50:30\");\n\n script_cve_id(\"CVE-2010-0252\", \"CVE-2010-0811\", \"CVE-2010-2193\");\n script_bugtraq_id(38045, 40490, 40494, 40496, 40535);\n script_xref(name:\"MSFT\", value:\"MS10-034\");\n script_xref(name:\"MSKB\", value:\"980195\");\n\n script_name(english:\"MS10-034: Cumulative Security Update of ActiveX Kill Bits (980195)\");\n script_summary(english:\"Checks if kill bits have been set\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Windows host is missing an update that disables selected\nActiveX controls.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The Microsoft Data Analyzer ActiveX control has a remote code\nexecution vulnerability. The system may also have one or more\nvulnerable third-party ActiveX controls installed.\n\nA remote attacker could exploit these issues by tricking a user into\nrequesting a maliciously crafted web page, resulting in arbitrary\ncode execution.\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2010/ms10-034\");\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Microsoft has released a set of patches for Windows 2000, XP, 2003,\nVista, 2008, 7, and 2008 R2.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_cwe_id(94);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/02/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/06/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/06/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, 'Host/patch_management_checks');\n\n exit(0);\n}\n\n\ninclude(\"smb_func.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_activex_func.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\n\n\ninclude(\"misc_func.inc\");\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS10-034';\nkbs = make_list(\"980195\");\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nif (!get_kb_item(\"SMB/Registry/Enumerated\")) exit(1, \"The registry wasn't enumerated.\");\nif (hotfix_check_sp(win2k:6, xp:4, win2003:3, vista:3, win7:1) <= 0)\n exit(0, \"The host is not affected based on its version / service pack.\");\nif (hotfix_check_server_core() == 1) exit(0, \"Windows Server Core installs are not affected.\");\nif (activex_init() != ACX_OK) exit(1, \"Unable to initialize the ActiveX API.\");\n\n\n# Test each control.\ninfo = \"\";\n\nkb = '980195';\nclsids = make_list(\n '{14FD1463-1F3F-4357-9C03-2080B442F503}', # Office Excel ActiveX control for Data Analysis (max3activex.dll)\n '{E9CB13DB-20AB-43C5-B283-977C58FB5754}', # Office Excel ActiveX control for Data Analysis (max3activex.dll)\n '{8fe85d00-4647-40b9-87e4-5eb8a52f4759}', # Microsoft Internet Explorer 8 Developer Tools (iedvtool.dll)\n '{F6A56D95-A3A3-11D2-AC26-400000058481}', # Danske eSec ActiveX\n '{56393399-041A-4650-94C7-13DFCB1F4665}', # CA PSFormX ActiveX (Pest Scan)\n '{6f750200-1362-4815-a476-88533de61d0c}', # Kodak Ofoto Upload Manager / Kodak Gallery Easy Upload Manager ActiveX Control\n '{6f750201-1362-4815-a476-88533de61d0c}', # Kodak Ofoto Upload Manager / Kodak Gallery Easy Upload Manager ActiveX Control\n '{7F14A9EE-6989-11D5-8152-00C04F191FCA}' # Avaya CallPilot Unified Messaging\n);\nforeach clsid (clsids)\n{\n if (activex_get_killbit(clsid:clsid) == 0)\n {\n info += ' ' + clsid + '\\n';\n if (!thorough_tests) break;\n }\n}\nactivex_end();\n\n\nif (info)\n{\n if (report_verbosity > 0)\n {\n if (max_index(split(info)) > 1) s = \"s\";\n else s = \"\";\n\n report =\n '\\nThe kill bit has not been set for the following control'+s+' :\\n\\n'+\n info;\n\n if (!thorough_tests)\n {\n report +=\n '\\nNote that Nessus did not check whether there were other kill bits\\n'+\n 'that have not been set because the \"Perform thorough tests\" setting\\n'+\n 'was not enabled when this scan was run.\\n';\n }\n hotfix_add_report(report, bulletin:bulletin, kb:kb);\n }\n set_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}