{"vuid":"VU#545228","idnumber":"545228","name":"Microsoft Office Web Components Spreadsheet ActiveX control vulnerability","keywords":["microsoft","security advisory","973472","office web components","remote code execution","spreadsheet","xls","owc10","owc11"],"overview":"The Microsoft Office Web Components Spreadsheet ActiveX controls (OWC10 and OWC11) contain a vulnerability that may allow an attacker to take control of a vulnerable system.","clean_desc":"The Office Web Components Spreadsheet ActiveX control contains a code execution vulnerability. Public reports indicate that this vulnerability is being actively exploited. Per the MSRC blog, the following products may install the affected control on a system: Microsoft Office XP Service Pack 3, Microsoft Office 2003 Service Pack 3, Microsoft Office XP Web Components Service Pack 3, Microsoft Office Web Components 2003 Service Pack 3, Microsoft Office 2003 Web Components for the  2007 Microsoft Office system Service Pack 1, Microsoft Internet Security and Acceleration Server 2004 Standard Edition Service Pack 3, Microsoft Internet Security and Acceleration Server 2004 Enterprise Edition Service Pack 3, Microsoft Internet Security and Acceleration Server 2006, Internet Security and Acceleration Server 2006 Supportability Update, Microsoft Internet Security and Acceleration Server 2006 Service Pack 1, Microsoft Office Small Business Accounting 2006. Further details are available from the Microsoft Security Research & Defense blog.","impact":"A remote attacker may be able to take control of a vulnerable system.","resolution":"Install the updates described in Microsoft Security Bulletin MS09-043.","workarounds":"Disable the Office Web Components Spreadsheet ActiveX controls in Internet Explorer The vulnerable controls can be disabled in Internet Explorer by setting the kill bit for the following CLSIDs: {0002E541-0000-0000-C000-000000000046} (OWC10) {0002E559-0000-0000-C000-000000000046} (OWC11) More information about how to set the kill bit is available in Microsoft Support Document 240797. Alternatively, the following text can be saved as a .REG file and imported to set the kill bit for these controls: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Internet Explorer\\ActiveX Compatibility\\{0002E541-0000-0000-C000-000000000046}] \"Compatibility Flags\"=dword:00000400\n[HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Internet Explorer\\ActiveX Compatibility\\{0002E541-0000-0000-C000-000000000046}]\n\"Compatibility Flags\"=dword:00000400 [HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Internet Explorer\\ActiveX Compatibility\\{0002E559-0000-0000-C000-000000000046}] \"Compatibility Flags\"=dword:00000400\n[HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Internet Explorer\\ActiveX Compatibility\\{0002E559-0000-0000-C000-000000000046}]\n\"Compatibility Flags\"=dword:00000400\nDisable ActiveX Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this and other ActiveX vulnerabilities. Instructions for disabling ActiveX in the Internet Zone can be found in the Securing Your Web Browser document.","sysaffected":"","thanks":"Thanks to Microsoft for information that was used in this report.","author":"This document was written by Ryan Giobbi.","public":["http://www.microsoft.com/technet/security/advisory/973472.mspx","http://blogs.technet.com/msrc/archive/2009/07/13/microsoft-security-advisory-973472-released.aspx","http://blogs.technet.com/srd/archive/2009/07/13/more-information-about-the-office-web-components-activex-vulnerability.aspx","http://www.microsoft.com/technet/security/bulletin/ms09-043.mspx","http://support.microsoft.com/kb/240797"],"cveids":["CVE-2009-1136"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2009-07-13T14:48:14Z","publicdate":"2009-07-13T00:00:00Z","datefirstpublished":"2009-07-15T18:12:41Z","dateupdated":"2009-08-27T05:40:46Z","revision":23,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"4","cam_internetinfrastructure":"10","cam_population":"20","cam_impact":"15","cam_easeofexploitation":"18","cam_attackeraccessrequired":"15","cam_scorecurrent":"44.04375","cam_scorecurrentwidelyknown":"51.6375","cam_scorecurrentwidelyknownexploited":"75.9375","ipprotocol":"","cvss_accessvector":"--","cvss_accesscomplexity":"--","cvss_authentication":null,"cvss_confidentialityimpact":"--","cvss_integrityimpact":"--","cvss_availabilityimpact":"--","cvss_exploitablity":null,"cvss_remediationlevel":"ND","cvss_reportconfidence":"ND","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"0","cvss_basevector":"AV:--/AC:--/Au:--/C:--/I:--/A:--","cvss_temporalscore":"0","cvss_environmentalscore":"0","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":44.04375,"vulnote":null}