SearchSecurity.com:
Requires Free Membership to View
Security researchers detected a new drive-by exploit in the wild actively targeting a zero-day vulnerability in an ActiveX component that connects to the Microsoft DirectShow video streaming software.
Microsoft issued a security advisory today calling the vulnerability in its Video ActiveX Control remotely exploitable with little user interaction when browsing with Internet Explorer. The ActiveX control msvidctl.dll connects to Microsoft DirectShow filters for use in capturing, recording, and playing video. The specific control is used by Windows Media Center to build filter graphs for recording and playing television video.
The software maker also issued an automated workaround until a patch is released.
Users of Windows 2000, 2003 or XP with Internet Explorer 6 and 7 are impacted by the attacks. Computers running Windows Vista or Windows Server 2008 are not affected by the attack.
The vulnerability is different from a DirectShow flaw acknowledged by Microsoft in May.
DirectShow vulnerability:
According to Symantec Corp., the exploit uses a JavaScript file and a data file to exploit the vulnerability in the video streaming ActiveX control. A victim must browse to a website hosting the malicious files.
"When a user visits a malicious website hosting these files, the vulnerability allows remote code execution and malicious files are downloaded," Symantec engineer Joji Hamada wrote on Symantec's security blog.
An attacker who successfully exploits the vulnerability could gain the same user rights as the local user, according to Microsoft.
Stephen Hall of the SANS Internet Storm Center said a valid work around for the attack vector is available which sets the kill bit on the vulnerable DLL. Hall posted details of the exploit.
Researchers say users of antivirus or IPS/IDS should ensure their signatures are up to date.
"It is likely to be widely deployed with the code being available," Hall wrote.
Updated with Microsoft information.
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation