Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Plugin Spotlight: Vulnerability in Microsoft Video ActiveX Control

Browsing the web is increasingly hazardous, especially given the recently released vulnerabilities and associated exploits. It’s interesting how the vulnerabilities are being referred to as "remote". While they are remotely exploitable, there are differences in how they are executed. One form of remote exploit requires no user interaction. A process listens on a port and is exploited over the network without the end user having to perform any action. The ActiveX vulnerability referenced in this plugin is remote, but does require that the user have a web browser loaded and actually be browsing the web. The exploit can be embedded into different web pages and executed without the user's knowledge or interaction on that particular page. Exploits that are “remote” in this context, but require a user to perform an action, are called “context dependant” by several vulnerability databases. Tenable has developed a plugin to detect a vulnerability that can be exploited in this manner.


Microsoft reports that they are aware of attacks occurring that are attempting to exploit this vulnerability and has issued an advisory. The Microsoft advisory describes a workaround to use until a patch is available.

Nessus plugin 39622,Vulnerability in Microsoft Video ActiveX Control Could Allow Remote Code Execution (972890) checks for this vulnerability. It requires that you have credentials on the hosts that are being tested and checks that the appropriate workarounds and countermeasures have been put into place. Workarounds entail removing support for Class Identifiers (CLSID) associated with msvidctl.dll on Windows XP and Windows Server 2003. Plugin 39622 checks that this action has been taken on those platforms only. If "Thorough Tests" are enabled, Nessus will check extended class IDs. Following is the output of the plugin:

activex.png

The plugin is available to both ProfessionalFeed and HomeFeed users as of July 7, 2009.

References

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Buy Now