Close
Sign in
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Subscribe
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    IE Exploit Attacks Another Piece of ActiveX

    Written by

    Steven J. Vaughan-Nichols
    Published July 7, 2004

    eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

    Using Internet Explorer hasnt gotten any safer in the past few days as a Dutch security hacker, Jelmer Kuperus, pointed out yet another unblocked security problem in the popular Web browser.

    The latest exploit, an attack on a Windows ActiveX component called Shell.Application, is similar to the Download.Ject attack, also called JS.Scob.Trojan. In that exploit, crackers broke into IIS servers on several popular but still unnamed sites and used them to spread keyboard loggers, proxy servers and other malware through IEs ActiveX scripting technology.

    Indeed, attackers used the spyware technique of installing a pop-up ad program, except this one silently installed a Trojan and a BHO (Browser Help Object) designed to swipe login information from several dozen financial sites.

    /zimages/2/28571.gifClick here for more on the pop-up program.

    The sites that spread the malware have since been fixed, but there has been no master shipping solution for the underlying IE vulnerabilities. Disabling Active scripting and ActiveX controls in the Internet Zone and Local Machine Zone will prevent exploitation of these holes, but at the cost of seriously affecting IEs functionality.

    Microsoft shipped a “patch” Friday that addressed part of this security problem by disabling the Windows component called ADODB.Stream.

    /zimages/2/28571.gifFor insights on security coverage around the Web, check out eWEEK.com Security Center Editor Larry Seltzers Weblog.

    Because of these developments, CERT (the U.S. Computer Emergency Readiness Team) and some IT professionals are recommending that users consider using other browsers such as Opera, Mozilla and Firefox.

    Others, noting how so much business depends on ActiveX-powered Web sites, are sticking with Internet Explorer in the hopes that forthcoming Microsoft IE security patches and Windows XP SP2 (Service Pack 2) will protect their systems from the newly exploited IE security holes.

    /zimages/2/28571.gifBut many enterprises are reluctant to dump IE because they run so many IE-specific intranet applications. Click here to read more.

    XP SP2 is expected to stop such attacks by hardening the barriers between processes running on the Internet Zone and on the far more dangerous Local Machine Zone, according to Thor Larholm, senior security researcher at PivX Solutions LLC, a security firm based in Newport Beach, Calif.

    But in the meantime, Kuperus has published code that he claims can be used to break into Windows systems running IE with the Shell.Application exploit. The possibility of attacks using Shell.Application has been known in security circles since at least January 2004, when it was reported in the @RISK newsletter from The SANS Institute, a cooperative security research and education organization.

    The Shell.Application exploit, like Download.Ject before it, makes it possible for crackers to create malicious, self-executing HTML files that can install and run an executable on the Web browsers PC.

    At this time, however, there have been no reported attacks using the Shell.Application exploit. Microsoft is working on security updates for Internet Explorer that will address this and other ActiveX security problems.

    Larry Seltzer contributed to this story.

    /zimages/2/28571.gifCheck out eWEEK.coms Security Center at http://security.eweek.com for security news, views and analysis.

    /zimages/2/77042.gif

    Be sure to add our eWEEK.com security news feed to your RSS newsreader or My Yahoo page: /zimages/2/19420.gif http://us.i1.yimg.com/us.yimg.com/i/us/my/addtomyyahoo2.gif

    Steven J. Vaughan-Nichols
    Steven J. Vaughan-Nichols
    I'm editor-at-large for Ziff Davis Enterprise. That's a fancy title that means I write about whatever topic strikes my fancy or needs written about across the Ziff Davis Enterprise family of publications. You'll find most of my stories in Linux-Watch, DesktopLinux and eWEEK. Prior to becoming a technology journalist, I worked at NASA and the Department of Defense on numerous major technological projects.

    Get the Free Newsletter!

    Subscribe to Daily Tech Insider for top news, trends & analysis

    Sign in
    Welcome! Log into your account
    Forgot your password? Get help
    Password recovery
    Recover your password
    A password will be e-mailed to you.

    LEAVE A REPLY

    Log in to leave a comment

    Get the Free Newsletter!

    Subscribe to Daily Tech Insider for top news, trends & analysis

    MOST POPULAR ARTICLES

    Artificial Intelligence

    9 Best AI 3D Generators You Need...

    Sam Rinko - June 25, 2024 0
    AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
    Read more
    Cloud

    RingCentral Expands Its Collaboration Platform

    Zeus Kerravala - November 22, 2023 0
    RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
    Read more
    Artificial Intelligence

    8 Best AI Data Analytics Software &...

    Aminu Abdullahi - January 18, 2024 0
    Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
    Read more
    Latest News

    Zeus Kerravala on Networking: Multicloud, 5G, and...

    James Maguire - December 16, 2022 0
    I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
    Read more
    Video

    Datadog President Amit Agarwal on Trends in...

    James Maguire - November 11, 2022 0
    I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
    Read more
    Logo

    eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

    Facebook
    Linkedin
    RSS
    Twitter
    Youtube

    Advertisers

    Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

    Advertise with Us

    Menu

    • About eWeek
    • Subscribe to our Newsletter
    • Latest News

    Our Brands

    • Privacy Policy
    • Terms
    • About
    • Contact
    • Advertise
    • Sitemap
    • California – Do Not Sell My Information

    Property of TechnologyAdvice.
    © 2024 TechnologyAdvice. All Rights Reserved

    Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.