Follow:

Exploit:Win/COM.ActiveX.RCE!CVE-2006-4697

Severity rating
Critical

Class/Type
Exploit

Discovered date
2007-02-13T00:00:00

Attack vector
Remote

Authentication required
No

Public exploits available
No

Signature detection
Medium



On this page




Description

A remote code execution vulnerability exists in the way Internet Explorer instantiates COM objects that are not intended to be instantiated in Internet Explorer. An attacker could exploit the vulnerability by constructing a specially crafted Web page that could potentially allow remote code execution if a user viewed the Web page. An attacker who successfully exploited this vulnerability could take complete control of an affected system.



Impact

An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.



Technical details (analysis)

When Internet Explorer tries to instantiate certain COM objects as ActiveX controls, the COM objects may corrupt the system state in such a way that an attacker could execute arbitrary code.An attacker could host a specially crafted Web site that is designed to exploit this vulnerability through Internet Explorer and then persuade a user to view the Web site. This can also include Web sites that accept user-provided content or advertisements, Web sites that host user-provided content or advertisements, and compromised Web sites. These Web sites could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger request that takes users to the attacker's Web site. It could also be possible to display specially crafted Web content by using banner advertisements or by using other methods to deliver Web content to affected systems



Affected software

Microsoft Internet Explorer 5.01 Service Pack 4 on Windows 2000 Service Pack 4.
Microsoft Internet Explorer 6 Service Pack 1 when installed on Windows 2000 Service Pack 4.
Microsoft Internet Explorer 6 for Windows XP Service Pack 2.
Microsoft Internet Explorer 6 for Windows XP Professional x64 Edition.
Microsoft Internet Explorer 6 for Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1.
Microsoft Internet Explorer 6 for Windows Server 2003 for Itanium-based Systems and Windows Server 2003 with SP1 for Itanium-based Systems.
Microsoft Internet Explorer 6 for Windows Server 2003 x64 Edition.
Windows Internet Explorer 7 for Windows XP Service Pack 2.
Windows Internet Explorer 7 for Windows XP Professional x64 Edition.
Windows Internet Explorer 7 for Windows Server 2003 Service Pack 1.
Windows Internet Explorer 7 for Windows Server 2003 Service Pack 1 .
Windows Internet Explorer 7 for Windows Server 2003 with SP1 for Itanium-based Systems.
Windows Internet Explorer 7 for Windows Server 2003 x64 Edition .



Non-affected software

Windows Internet Explorer 7 in Windows Vista



References




Solutions




NIS signature

Name: Exploit:Win/COM.ActiveX.RCE!CVE-2006-4697
Release Date: 2007-02-13T00:00:00



Known false positives

No known false positives at this time.



Work-arounds

Configure Internet Explorer to prompt before running ActiveX Controls or disable ActiveX Controls in the Internet and Local intranet security zone.
Set Internet and Local intranet security zone settings to “High” to prompt before running ActiveX Controls and Active Scripting in these zones.
Prevent COM objects from running in Internet Explorer