what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Technical Cyber Security Alert 2008-189A

Technical Cyber Security Alert 2008-189A
Posted Jul 10, 2008
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA08-189A - Microsoft has released Security Advisory (955179) to describe attacks on a vulnerability in the Microsoft Office Snapshot Viewer ActiveX control. Because no fix is currently available for this vulnerability, please see the Security Advisory and US-CERT Vulnerability Note VU#837785 for workarounds.

tags | advisory, activex
SHA-256 | 3397ca6655493aef10aa96c5c3922c0c896f9e2385119040cd8fcdfbcc7ae6e1

Technical Cyber Security Alert 2008-189A

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Alert System

Technical Cyber Security Alert TA08-189A


Microsoft Office Snapshot Viewer ActiveX Vulnerability

Original release date: July 7, 2008
Last revised: --
Source: US-CERT


Systems Affected

* Microsoft Office Access 2000
* Microsoft Office Access XP
* Microsoft Office Access 2003
* Microsoft Office Snapshot Viewer


Overview

An unpatched vulnerability in the Microsoft Office Snapshot Viewer ActiveX
control is being used in attacks.


I. Description

Microsoft has released Security Advisory (955179) to describe attacks on a
vulnerability in the Microsoft Office Snapshot Viewer ActiveX control.
Because no fix is currently available for this vulnerability, please see the
Security Advisory and US-CERT Vulnerability Note VU#837785 for workarounds.


II. Impact

A remote, unauthenticated attacker could execute arbitrary code.


III. Solution

Apply workarounds

Microsoft has provided workarounds for this vulnerability in Security
Advisory (955179). Additional details and workarounds are provided in
US-CERT Vulnerability Note VU#837785.

The most effective workaround for this vulnerability is to set kill bits for
the Snapshot Viewer ActiveX control, as outlined in the documents noted
above. Other workarounds include disabling ActiveX, as specified in the
Securing Your Web Browser document, and upgrading to Internet Explorer 7,
which can help mitigate the vulnerability with its ActiveX opt-in feature.


IV. References

* US-CERT Vulnerability Note VU#837785 -
<http://www.kb.cert.org/vuls/id/837785>

* Microsoft Security Advisory (955179) -
<http://www.microsoft.com/technet/security/advisory/955179.mspx>

* Securing Your Web Browser -
<http://www.us-cert.gov/reading_room/securing_browser/>


____________________________________________________________________

The most recent version of this document can be found at:

<http://www.us-cert.gov/cas/techalerts/TA08-189A.html>
____________________________________________________________________

Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA08-189A Feedback VU#837785" in the
subject.
____________________________________________________________________

For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________

Produced 2008 by US-CERT, a government organization.

Terms of use:

<http://www.us-cert.gov/legal.html>
____________________________________________________________________


Revision History

July 7, 2008: Initial release




-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBSHJ0D3IHljM+H4irAQI4/gf9GMgKMgFwrFpwXqtkcESdNuOqHHBU2z57
tRdKpqpZL0nRY11z5FEx2wBK56/GBYVBn5pGjH9/LpWnbvsqVdt3wePgXHhbAJYW
GMhZj4JKa+313sTszdrEUmTZK8gK+QZtx2V3+rSVNhMbnQHVUYxevjUtNGrI5Sni
iITq9GVJX7GIQb3aI+uFaxScWD84tf9rnUqP71SmapWvaz5rnTdPH/QPLZtpcoT8
Nw/uQAzekHUfvqbvkUdud39X4IOJKz2Vi10r3QC+gdkHCrNaXtM2RoIfkU9+B3f4
91SBnJpmhwgifILsll9WHHvYATZScUWINUkMMA/vpBXHNxMmXP+7XQ==
=lT3a
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close