Microsoft Windows是微软发布的非常流行的操作系统。
Windows的Microsoft Agent ActiveX控件在处理.ACF文件时存在缓冲区溢出漏洞,远程攻击者可能利用此漏洞在服务器上执行任意指令。
攻击者可能通过构建特制网页来利用此漏洞,如果用户查看了该网页,则可能允许远程执行代码。
Microsoft Windows XP SP2
Microsoft Windows Server 2003 SP1
Microsoft Windows Server 2003
Microsoft Windows 2000SP4
临时解决方法:
如果您不能立刻安装补丁或者升级,SEBUG.NET建议您采取以下措施以降低威胁:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F}]
"Compatibility Flags"=dword:00000400
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility{F5BE8BD2-7DE6-11D0-91FE-00C04FD701A5}]
"Compatibility Flags"=dword:00000400
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility{4BAC124B-78C8-11D1-B9A8-00C04FD97575}]
"Compatibility Flags"=dword:00000400
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility{D45FD31D-5C6E-11D1-9EC1-00C04FD7081F}]
"Compatibility Flags"=dword:00000400
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility{D45FD31E-5C6E-11D1-9EC1-00C04FD7081F}]
"Compatibility Flags"=dword:00000400
您可以通过双击此.reg文件将其应用到各个系统,还可以使用组策略跨域应用该文件。
厂商补丁:
Microsoft已经为此发布了一个安全公告(MS06-068)以及相应补丁:
MS06-068:Vulnerability in Microsoft Agent Could Allow Remote Code Execution (920213)
链接:<a href=“http://www.microsoft.com/technet/security/bulletin/ms06-068.mspx” target=“_blank”>http://www.microsoft.com/technet/security/bulletin/ms06-068.mspx</a>