BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

WMI Object Broker ActiveX

Disclosed August 10, 2006    Fully Patched

Vulnerability Description:

A remote code execution vulnerability exists within Visual Studio 2005′s WMI Object Broker ActiveX object which may be exploited by attackers to execute arbitrary code on a remote system by a specially-crafted website.

Vendors:

Microsoft

Vulnerable Software/Devices:

Visual Studio 2005

Vulnerability Severity:

High

Exploit Availability:

N/A

Exploit Impact:

Remote Code Execution
Arbitrary code execution under the context of the logged in user An ActiveX remote code execution vulnerability has a very high impact since the source of the malicious payload can be any site on the Internet. An even more critical problem is generated when clients are administrators on their local hosts, which would run the malicious payload with Administrator credentials.

BeyondTrust Prevention and Detection:

BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

Patch:
Vulnerability in Visual Studio 2005 Could Allow Remote Code Execution (925674)

Mitigation:

The best form of mitigation is available by kill-bitting the CLSIDs for the WMI Object Broker ActiveX Control (7F5B7F63-F06F-4331-8A26-339E03C0AE3D) following the directions of KB240797.
NOTE:The Microsoft patch will kill-bit the ActiveX, as well as update the binary.

Links:

CVE-2006-4704
Microsoft Security Advisory (927709)
Metasploit Plugin - Internet Explorer COM CreateObject Code Execution

CVE(s):

None

Leave a Reply