Page 309 - StudyBook.pdf
P. 309

Communication Security: Web Based Services • Chapter 5  293

                 that the author is the one using the control, or that it is being used in the way it
                 was intended, or on the site or pages for which it was intended. Microsoft also
                 cannot guarantee that the owner of the site or someone else has not modified the
                 pages since the control was put in place. It is the exploitation of these vulnerabili-
                 ties that poses the greatest dangers associated with using ActiveX controls.
                    Symantec’s Web site reports that the number of ActiveX vulnerabilities over the
                 last few years have increased dramatically, with those affecting ActiveX controls
                 shipped by vendors increasing upwards of 300 percent. From 2002 to 2005, there
                 was a range of 12 to 15 vulnerabilities affecting ActiveX controls found each year,
                 but in 2006, this number jumped to 50.While it would be nice to think that all of
                 these are due to inexperienced programmers who aren’t observing best practices in
                 coding, even Microsoft has shipped a number of vulnerable controls over the years.
                    The vulnerabilities that have occurred over the years include major issues that
                 could be exploited by hackers. For example, in 2006, vulnerabilities were found in
                 Microsoft’s XML Core Services that provided hackers with the ability to run
                 remote code on affected systems. If a hacker wrote code on a Web page to exploit
                 this vulnerability, he or she could gain access to a visiting computer.The hacker
                 would be able to run code remotely on the user’s computer, and have the security
                 associated with that user. In other words, if the user was logged in as an adminis-
                 trator to the computer, the hacker could add, delete, and modify files, create new
                 accounts, and so on.Although a security update was released in October 2006 that
                 remedied the problem, anyone without the security update applied to his or her
                 system could still be affected. It just goes to show that every time a door is closed
                 to a system, a hacker will find a way to kick in a window.


                   The Dangers of ActiveX
               Tools & Traps…  control as soon as it was loaded into an ActiveX control embedded on the
                   Prior to 2006, ActiveX controls could activate on a Web page without any
                   interaction from the user. For example, a video could play in an ActiveX

                   Web page. Since then, Web pages can still use the <APPLET>, <EMBED>,
                   or <OBJECT> tags to load ActiveX controls, but the user interface of the
                   control will be deactivated until the user clicks on the control. The reason
                   why Microsoft has suddenly blocked these controls from activating auto-
                   matically is due to a lawsuit with Eolas involving patented technology
                   that allowed content like ActiveX controls to load automatically. In 1994,
                   Microsoft was offered to license the technology, but refused, resulting in
                   a multimillion-dollar lawsuit for infringement. Because of the infringe-
                   ment case, Microsoft released a software update in 2006 that requires

                                                                                        Continued

                                                                              www.syngress.com
   304   305   306   307   308   309   310   311   312   313   314