Microsoft Security Advisory (972890)
Vulnerability in Microsoft Video ActiveX Control Could Allow Remote Code Execution
Published: July 06, 2009
What is the scope of the advisory?
is aware of a new vulnerability report affecting Microsoft Video
ActiveX Control. This affects the operating systems listed in the Overview section.
Is this a security vulnerability that requires Microsoft to issue a security update?
is currently working to develop a security update for Windows to
address this vulnerability. Microsoft will release the security update
once it has reached an appropriate level of quality for broad
What is the Microsoft Video ActiveX Control?
Microsoft Video Control object is a Microsoft ActiveX control that
connects Microsoft DirectShow filters for use in capturing, recording,
and playing video. It is the main component that Microsoft Windows
Media Center uses to build filter graphs for recording and playing
What causes this threat?
ActiveX control is used in Internet Explorer, the control may corrupt
the system state in such a way that an attacker could run arbitrary
What might an attacker use this vulnerability to do?
a user is logged on with administrative user rights, an attacker could
take complete control of the affected system. An attacker could then
install programs; view, change, or delete data; or create new accounts
with full user rights. Users whose accounts are configured to have
fewer user rights on the system could be less impacted than users who
operate with administrative user rights.
refers to a setting or configuration change that does not correct the
underlying vulnerability but would help block known attack vectors
before you apply the update. Microsoft has tested the following
workarounds and states in the discussion whether a workaround reduces
Prevent Microsoft Video ActiveX Control from running in Internet Explorer
Note See Microsoft Knowledge Base Article 972890 for information on how to implement this workaround automatically.