Key Details of Windows 2000 ActiveX Parameter Validation Vulnerability Patch
Developer's Description
An ActiveX control that ships as part of Windows 2000 contains an unchecked buffer. If the control was called from a Web page or HTML mail using a specially-malformed parameter, it would be possible to cause code to execute on the machine via a buffer overrun. This could potentially enable a malicious user to take any desired action on the user's machine, limited only by the permissions of the user.
The vulnerability could only be exploited if ActiveX controls are enabled in IE, Outlook, or Outlook Express. The Security Zones feature in Internet Explorer enables customers to limit what Web sites can do, and customers who have used the feature to prevent untrusted sites from invoking ActiveX controls would be at minimal risk from the Web-based attack scenario. Customers who have applied the Outlook Security Update would be protected against the mail-borne scenario, since it moves mail into the Restricted Sites Zone, thereby preventing HTML mails from invoking ActiveX controls.
See the ActiveX Parameter Validation Vulnerability FAQ for more information.
Explore More
AirSnare
FreeAlparysoft HandsFree Screensaver
Trial versionAdvanced Security Level
Trial versionInnoLock
Trial versionSecEx MD5+ Digest
FreeMiniTrezor
FreePasswords
Trial versionTukanas Password Generator
FreePRS Password Recovery Software
Trial versionPassword Creator
FreeMobius
Trial versionUltraSafe
Trial version