XMLHTTP zero-day exploit


ActiveX vulnerability in use by attackers.

A new flaw in

Microsoft

‘s

XML Core Services 4.0

is in active use by malicious websites, with attackers using the vulnerability to initiate drive-by downloads of malware. With exploits expected to become more widespread as details of the vulnerability spread,

Secunia

have rated the flaw ‘extremely critical’.

The flaw, in the

XMLHTTP 4.0 ActiveX Control

, allows remote code execution over the network.

SANS

have

confirmed the flaw is ‘in the wild’

, while

Microsoft

have stated in their

advisory

that among

Windows

users, only those running the full security features of

Windows Server 2003

are protected. They have issued several workaround preventative measures, and advised users to ensure their anti-virus software is up to date

The

Secunia

alert is

here

.

Posted on 07 November 2006 by

Virus Bulletin


Posted

in

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *