Security pros: Kill ActiveX
Wave of IE plug-in bugs prompts US-CERT to recommend disabling ActiveX
Computerworld - A wave of bugs in the plug-in technology used by Microsoft Corp.'s Internet Explorer browser has some security experts, including those at US-CERT, recommending that users disable all ActiveX controls.
The U. S. Computer Emergency Readiness Team, part of the U.S. Department of Homeland Security, put it bluntly in advisories posted in the last two days: "US-CERT encourages users to disable ActiveX controls as described in the Securing Your Web Browser document," the organization recommended.
Three new vulnerabilities in the photo uploader software used by both Facebook and MySpace were disclosed yesterday by researcher Elezar Broad, who on Monday also posted sample attack code for a pair of critical bugs in Yahoo's Music Jukebox. Last week, Broad had pinned the Facebook and MySpace ActiveX controls with two other flaws. All five of the Facebook/MySpace vulnerabilities originated with an ActiveX control developed by Aurigma Inc.
As the number of vulnerabilities mounted, security professionals began ringing the alarm. On Monday, for instance, Symantec analysts urged users to "use caution when browsing the Web" and told IT administrators to disable the relevant ActiveX controls by setting several "kill bits" in the Windows registry.
US-CERT, however, offered up more aggressive advice as it recommended users move IE's security level to the "High" setting, which completely disables all ActiveX controls.
"That's the easiest way to protect yourself," agreed Oliver Friedrichs, director of Symantec Corp.'s security response group. "But it can also have an adverse impact on your browsing experience." A compromise, said Friedrichs, would be to disable "only those plug-ins that pose a current and imminent threat," such as the flawed ActiveX controls used by Facebook, MySpace and Yahoo.
Disabling individual ActiveX controls, however, requires editing the Windows registry. That's too scary for most home users to contemplate, but business users are another matter. "That approach is hard to argue against in the enterprise," said Friedrichs, who noted that there are tools available that let corporate IT administrators push registry changes -- including new keys that disable specific ActiveX controls -- to all users.
The SANS Institute's Internet Storm Center acknowledged that setting kill bits is beyond the ken of most users; one of its researchers came up with a graphical interface-based tool that sets and clears the kill bits of six ActiveX controls that have been tagged with bugs in the past week. The free tool can be downloaded at the ISC's Web site.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts