A buffer overflow exists within the daxctle.ocx ActiveX object which may be exploited by attackers to execute arbitrary code on a remote system by a specially-crafted website. The vulnerability is caused by an attacker manipulating arguments to the KeyFrame method.
Internet Explorer 5.01
Internet Explorer 6
Remote Code Execution
Arbitrary code execution under the context of the logged in user An ActiveX remote code execution vulnerability has a very high impact since the source of the malicious payload can be any site on the Internet. An even more critical problem is generated when clients are administrators on their local hosts, which would run the malicious payload with Administrator credentials.
BeyondTrust Prevention and Detection:
BeyondTrust's Blink® Personal Edition protects from this vulnerability.
BeyondTrust's Blink® Professional Edition protects from this vulnerability.
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.
Microsoft Patch - MS06-067
Since this vulnerability is patched, the primary mitigation for this vulnerability would be to apply MS06-067. However, the best for of mitigation is available by kill-bitting the CLSIDs for the Microsoft DirectAnimation Path ActiveX Control (D7A7D7C3-D47F-11D0-89D3-00A0C90833E6) following the directions of KB240797. It should be noted that the 'Cumulative Security Update for Internet Explorer' only kill-bits the ActiveX and does not actually fix the underlying vulnerable code, only stops the attack vectors.
First Public PoC Code Disclosure (Malicious Payload - Downloads and Executes an arbitrary file)
Microsoft Security Advisory (925444)