A remote code execution vulnerability exists within Visual Studio 2005′s WMI Object Broker ActiveX object which may be exploited by attackers to execute arbitrary code on a remote system by a specially-crafted website.
Visual Studio 2005
Remote Code Execution
Arbitrary code execution under the context of the logged in user An ActiveX remote code execution vulnerability has a very high impact since the source of the malicious payload can be any site on the Internet. An even more critical problem is generated when clients are administrators on their local hosts, which would run the malicious payload with Administrator credentials.
BeyondTrust Prevention and Detection:
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.
Vulnerability in Visual Studio 2005 Could Allow Remote Code Execution (925674)
The best form of mitigation is available by kill-bitting the CLSIDs for the WMI Object Broker ActiveX Control (7F5B7F63-F06F-4331-8A26-339E03C0AE3D) following the directions of KB240797.
NOTE:The Microsoft patch will kill-bit the ActiveX, as well as update the binary.
Microsoft Security Advisory (927709)
Metasploit Plugin - Internet Explorer COM CreateObject Code Execution