Microsoft ActiveX bug is ‘extremely critical’


Microsoft ActiveX bug is ‘extremely critical’

Tash Shifrin

Microsoft has confirmed it is investigating a security bug described by independent security experts as “extremely critical” in XML Core Services on Windows.

The company said it was aware of “limited attacks” that were attempting to exploit the vulnerability.

Security firm Secunia warned that the hackers could exploit the “extremely critical” flaw in the XMLHTTP 4.0 ActiveX Control of XML Core Services to compromise a user’s system and execute arbitrary code.

Microsoft said exploitation of the flaw relied on attackers luring users to malicious websites. Users running Windows Server 2003 and Windows Server 2003 Service Pack 1 in their default configurations, with the Enhanced Security Configuration switched on, would not be affected.

The software giant said it would “take appropriate action” following its investigation. A security update would be issued either through Microsoft’s monthly patching cycle, or through an out-of-cycle update.

Comment on this article:

Email Alerts

Register now to receive IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

COMMENTS powered by Disqus  //  Commenting policy