http://www.darkreading.com/document.asp?doc_id=153221
<http://www.darkreading.com/document.asp?doc_id=153221&WT.svl=news2_2>
&WT.svl=news2_2

 



Free 'AxBan' Tool Kills Bad ActiveX Controls


http://img.lightreading.com/images/spacer.gif


Errata Security offers freebie ActiveX 'killbit' tool for users


http://img.lightreading.com/images/spacer.gif


http://img.lightreading.com/images/spacer.gif

 


MAY 7, 2008 | 5:55 PM

By Kelly Jackson Higgins
Senior Editor, Dark Reading 

Researchers at Errata Security are offering a free tool for users that
protects them from the wave of malicious ActiveX controls plaguing Internet
Explorer browsers. 

Errata created the tool, called AxBan
<http://erratasec.blogspot.com/2008/05/activex-is-dangerous.html> , as a
more user-friendly alternative to Microsoft's
<http://support.microsoft.com/kb/240797>  method for stopping an ActiveX
control from running in Explorer. AxBan basically runs in the background, so
rather than having to manually configure ActiveX control protection (or
deactivate ActiveX altogether), AxBan handles the malicious ActiveX controls
automatically. 

"We just keep seeing more and more ActiveX exploits on sites like" milw0rm
<http://www.milw0rm.com/remote.php> , says David Maynor, CTO of Errata.
AxBan will be available for download on Errata's site later today. It's
offering the beta <http://portal.erratasec.com/axb/AxBan-beta.exe>  version
now. 

ActiveX controls typically keep a low profile on the user's machine, and can
be used to execute more targeted attacks. "Users may not even know they have
these bad controls installed, and the result is that drive-by malware
installs can take advantage of these," he says. 

AxBan basically provides users with a list of known ActiveX controls on
their system. "It marks those known to be bad," and the user clicks on the
"killbit" to prevent it from running in the browser, says Robert Graham, CEO
of Errata. 

One of the more high-profile examples of a malicious ActiveX control is a
milw0rm exploit created for recently revealed vulnerabilities in HP Update,
HP's software update tool for PCs, printers, and scanners. The ActiveX flaws
-- which HP since has patched -- could trick a user into visiting a
malicious Website, as well as allow an attacker to grab system and OS
information, according to a Secunia advisory
<http://secunia.com/advisories/29966/>  that ranked the bug as "highly
critical." 

Meanwhile, Errata plans to regularly update AxBan with new ActiveX control
threats, Graham says. 

"We don't write a vulnerability scanner for your system. We write tools you
can use to see 'how secure is my system?'" Graham says. 

Have a comment on this story? Please click "Discuss" below. If you'd like to
contact Dark Reading's editors directly, send us a message
<mailto:[EMAIL PROTECTED]> .

.  Errata Security
<http://www.darkreading.com/complink_redirect.asp?vl_id=9818>  

.  Microsoft Corp.
<http://www.darkreading.com/complink_redirect.asp?vl_id=3426>  (Nasdaq:
MSFT)

 

<<image001.png>>

<<image002.png>>

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to