Security flaws in the help facility of most versions of Microsoft’s Windows operating system could allow an attacker to take control of a user’s PC, Microsoft warned late Wednesday.All versions of the Windows operating system, from Windows 98 up, include a help function based on HTML. Much of its functionality is provided by an ActiveX control, a software component that can be called upon by a Web page. An unchecked buffer in this control is what exposes the user’s system, Microsoft said in security bulletin MS02-055. The issue is rated “critical” by Microsoft because the help function can also be called by a Web site or HTML e-mail, not just by applications on a user’s PC. An attacker who invoked the help facility and exploited the flaw could take virtually any action on a PC a user could take, Microsoft said. Users of Outlook 2002 or Outlook Express 6 are protected from the e-mail-based attack because those applications handle HTML e-mail messages in a different manner. Users who installed the Microsoft-recommended Outlook Email Security Update are also protected, Microsoft said. A software patch is available to protect a system against a Web site attack. However, the user needs to have Internet Explorer Version 5.01, 5.5 or 6 installed for it to work, Microsoft said.The patch also eliminates two other flaws in the Windows help facility. These flaws relate to the way HTML Help files are handled. These files can contain shortcuts that can take any action on a system. Only trusted files should be allowed to use these shortcuts, but the flaws allow a way around this restriction, Microsoft said. Microsoft rates these flaws “moderate” because staging an attack exploiting them would be tough. An attacker would have to know the location of a user’s temporary Internet files folder, which should be impossible, according to Microsoft. Applying the patch does not provide a new ActiveX control for the help function, it updates the old control to remove the vulnerabilities, Microsoft said. This means that an attacker could remotely reinstall the vulnerable control, because it still has a valid digital signature from Microsoft. This could be prevented by setting the so-called “Kill Bit” on the ActiveX control, disallowing Internet Explorer from ever invoking it. However, the Kill Bit is not set because it would make help facilities in many applications that link to the old control unavailable, Microsoft said. Microsoft acknowledges that an attacker could reintroduce the vulnerable control and suggests that users disable the downloading of ActiveX controls in Internet Explorer. In a separate security bulletin on Wednesday, Microsoft warned of two “moderate” risk flaws in the file decompression utility that is part of Windows Me, Windows XP, and the Windows 98 Plus! Pack. These flaws could allow an attacker to either run code on a user’s system or place files in a location of his choice. However, the vulnerabilities cannot be exploited without user intervention and cannot be exploited remotely, Microsoft said in bulletin MS02-054. http://www.microsoft.com/technet/security/bulletin/MS02-054.asp Microsoft security bulletin MS02-054http://www.microsoft.com/technet/security/bulletin/MS02-055.asp Microsoft security bulletin MS02-055 Related content news Broadcom to lay off over 1,200 VMware employees as deal closes The closing of VMware’s $69 billion acquisition by Broadcom will lead to layoffs, with 1,267 VMware workers set to lose their jobs at the start of the new year. By Jon Gold Dec 01, 2023 3 mins Technology Industry Mergers and Acquisitions news analysis Cisco joins $10M funding round for Aviz Networks' enterprise SONiC drive Investment news follows a partnership between the vendors aimed at delivering an enterprise-grade SONiC offering for customers interested in the open-source network operating system. By Michael Cooney Dec 01, 2023 3 mins Network Management Software Network Management Software Network Management Software news Cisco CCNA and AWS cloud networking rank among highest paying IT certifications Cloud expertise and security know-how remain critical in building today’s networks, and these skills pay top dollar, according to Skillsoft’s annual ranking of the most valuable IT certifications. Demand for talent continues to outweigh s By Denise Dubie Nov 30, 2023 7 mins Certifications Certifications Certifications news Mainframe modernization gets a boost from Kyndryl, AWS collaboration Kyndryl and AWS have expanded their partnership to help enterprise customers simplify and accelerate their mainframe modernization initiatives. By Michael Cooney Nov 30, 2023 4 mins Mainframes Cloud Computing Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe