Internet Explorer: Exploit of the Week

Microsoft has issued a new security advisory for Internet Explorer.  It relates to a Microsoft Office Web component, the ActiveX control that is used to display Excel spreadsheets retrieved from a Web site.  This is a serious vulnerability, since it potentially would allow execution of an arbitrary program if a user simply visits a compromised Web site.

According to the advisory, there is no fix available at present for this vulnerability.  There is, however, a work-around which disables the vulnerable software control.  This is done by setting the “kill bit” for the relevant ActiveX controls in the Windows Registry.   As I have noted before, this is not for the faint of heart.  Instructions for implementing the fix are in the “Suggested Actions / Workarounds” section of the advisory.  The ClassIDs of the Active X controls are:



Alternatively, you can look at the associated Knowledge Base article.   In the “Fix It for Me” section, you will find a link to download a small Microsoft Installer (.msi) file that will set the appropriate kill bits.

According to Microsoft, implementing the workaround should not affect applications, other than to disable the facility for viewing Excel spreadsheets for the Web.  Since there is apparently an exploit for this vulnerability “in the wild”, I recommend implementing the work-around as soon as you can.

The SANS Institute also has an article on this vulnerability.

Update, Monday, July 13, 22:35

According to the report at SANS, and those from other places, this vulnerability is now being actively exploited on a fairly widespread basis,.  I strongly urge folks using Windows to either install the work-around described above, or use an alternative browser that does not employ ActiveX, such as Firefox or Opera.

Comments are closed.

%d bloggers like this: