CVE-2006-0057
CVSS7.5
发布时间 :2006-01-27 17:03:00
修订时间 :2008-09-05 16:58:15
NMCO    

[原文]Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to bypass the Kill bit settings for dangerous ActiveX controls via unknown vectors involving crafted HTML, which can expose the browser to attacks that would otherwise be prevented by the Kill bit setting. NOTE: CERT/CC claims that MS05-054 fixes this issue, but it is not described in MS05-054.


[CNNVD]Microsoft Internet Explorer ActiveX控件禁止设置绕过漏洞(CNNVD-200601-357)

        Internet Explorer是Microsoft开发的非常流行的WEB浏览器,它提供对ActiveX控件的支持以实现强大的交互功能。
        Internet Explorer处理ActiveX的执行时存在漏洞,攻击者可能绕过某个ActiveX的禁止设置获得非授权的执行。当某个ActiveX控件被发现存在漏洞时,用户可以在IE里设置禁止执行此控件,在执行控件前IE会检查特定的注册表键值以决定是否执行,如果为特定的值,则不执行。IE被发现存在漏洞,特定构造的HTML页面可以绕过IE的禁止设置,使恶意ActiveX控件被执行。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:ie:6:windows_server_2003_sp1
cpe:/a:microsoft:ie:6:sp1Microsoft Internet Explorer 6 Service Pack 1
cpe:/a:microsoft:ie:5.5:sp2Microsoft Internet Explorer 5.5 SP2
cpe:/a:microsoft:ie:5.01:sp4Microsoft Internet Explorer 5.01 Service Pack 4

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0057
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0057
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200601-357
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/998297
(VENDOR_ADVISORY)  CERT-VN  VU#998297
http://www.microsoft.com/technet/security/bulletin/ms05-054.mspx
(VENDOR_ADVISORY)  MISC  http://www.microsoft.com/technet/security/bulletin/ms05-054.mspx
http://xforce.iss.net/xforce/xfdb/24379
(UNKNOWN)  XF  ie-activex-killbit-bypass(24379)
http://www.securityfocus.com/bid/16409
(UNKNOWN)  BID  16409
http://www.osvdb.org/23657
(UNKNOWN)  OSVDB  23657

- 漏洞信息

Microsoft Internet Explorer ActiveX控件禁止设置绕过漏洞
高危 设计错误
2006-01-27 00:00:00 2006-01-30 00:00:00
远程  
        Internet Explorer是Microsoft开发的非常流行的WEB浏览器,它提供对ActiveX控件的支持以实现强大的交互功能。
        Internet Explorer处理ActiveX的执行时存在漏洞,攻击者可能绕过某个ActiveX的禁止设置获得非授权的执行。当某个ActiveX控件被发现存在漏洞时,用户可以在IE里设置禁止执行此控件,在执行控件前IE会检查特定的注册表键值以决定是否执行,如果为特定的值,则不执行。IE被发现存在漏洞,特定构造的HTML页面可以绕过IE的禁止设置,使恶意ActiveX控件被执行。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.microsoft.com/technet/security/bulletin/ms05-054.mspx

- 漏洞信息

23657
Microsoft IE ActiveX Killbit Setting Bypass
Remote / Network Access, Context Dependent Input Manipulation
Loss of Integrity
Exploit Unknown

- 漏洞描述

Microsoft Internet Explorer contains a flaw that may allow a malicious user to bypass the kill bit settings for ActiveX controls. The issue is triggered when user visits a malicious web page that contains specially crafted HTML which would cause the killbit setting for ActiveX controls to be bypassed. It is possible that the flaw may allow to execute arbitary code with user privileges.

- 时间线

2006-01-27 Unknow
Unknow Unknow

- 解决方案

Microsoft has released a patch to address this issue. Additionally, it is possible to correct the flaw by implementing the following workaround(s): Stop ActiveX control from running in Internet Explorer.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站