{"vuid":"VU#810772","idnumber":"810772","name":"Microsoft Agent fails to properly handle specially crafted .ACF files","keywords":["Microsoft","Agent","remote code execution",".ACF files","ms06-nov"],"overview":"Microsoft Agent fails to properly handle specially crafted .ACF files and may allow a remote attacker to execute arbitrary code.","clean_desc":"Microsoft Agent is a software technology that enables an enriched form of user interaction that can make using and learning to use a computer easier and more natural. A vulnerability exists in the way that Microsoft Agent handles specially crafted .ACF files. Exploitation can occur when a remote attacker convinces the user to visit a specially crafted web site. Microsoft states that the following systems are affected: Microsoft Windows 2000 Service Pack 4\nMicrosoft Windows XP Service Pack 2\nMicrosoft Windows XP Professional x64 Edition\nMicrosoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1\nMicrosoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems\nMicrosoft Windows Server 2003 x64 Edition","impact":"This vulnerability may allow a remote attacker to execute arbitrary code with the privileges of the local user.","resolution":"Apply an update Microsoft has released updates in Microsoft Security Bulletin MS06-068 to address this issue.","workarounds":"Workarounds Microsoft has provided the following workarounds, please reference MS06-068 for further information. Temporarily prevent the Microsoft Agent ActiveX control from running in Internet Explorer\nConfigure Internet Explorer to prompt before running ActiveX Controls or disable ActiveX Controls in the Internet and Local intranet security zone\nSet Internet and Local intranet security zone settings to “High” to prompt before running ActiveX Controls and Active Scripting in these zones","sysaffected":"","thanks":"Thanks to Microsoft Security for reporting this vulnerability in Microsoft Security Bulletin \nMS06-068","author":"This document was written by Katie Steiner.","public":["http://www.microsoft.com/technet/security/bulletin/ms06-068.mspx","http://secunia.com/advisories/22878/","http://www.securityfocus.com/bid/21034"],"cveids":["CVE-2006-3445"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-11-14T19:39:08Z","publicdate":"2006-11-14T00:00:00Z","datefirstpublished":"2006-11-14T22:05:40Z","dateupdated":"2007-02-07T19:39:23Z","revision":14,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"17","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"16","cam_impact":"19","cam_easeofexploitation":"9","cam_attackeraccessrequired":"20","cam_scorecurrent":"22.572","cam_scorecurrentwidelyknown":"25.65","cam_scorecurrentwidelyknownexploited":"46.17","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":22.572,"vulnote":null}