In association with heise online

15 June 2007, 15:06

Vulnerability in Microsoft Office 2003 ActiveX control

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

An ActiveX control supplied with Microsoft Office (Office Data Source Control 11, OWC11.DLL) contains an error in the function DeleteRecordSourceIfUnused, which can be exploited to trigger a buffer overflow by means of crafted HTML documents. The buffer overflow occurs if excess data is passed to the HelpPopup method of the DeleteRecordSourceIfUnused() method of the ActiveX control, and can be exploited to run arbitrary code in the context of the calling application, which likely to be Internet Explorer. Failed attempts apparently lead to a crash. A published exploit demonstrates how Internet Explorer 6 crashes when opening this type of document. Visiting a manipulated web page would be sufficient for infection with malware via this vulnerability.

No patch is available. This bug can be protected against by setting a kill-bit in the registry so that the vulnerable control (CLSID0002E55B-0000-0000-C000-000000000046) no longer loads. Since the security vulnerabilities found in ActiveX controls are currently accumulating epidemically, it makes more sense to deactivate ActiveX in the browser, at least for the internet zone.

See also:


Print Version | Send by email | Permalink:

  • July's Community Calendar

The H Open

The H Security

The H Developer

The H Internet Toolkit