S-256: Security Update of ActiveX Kill Bits


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-256: Security Update of ActiveX Kill Bits
# 1  
Old 04-09-2008
S-256: Security Update of ActiveX Kill Bits

A remote code execution vulnerability exists in the ActiveX control hxvz.dll and an update that includes kill bits that will prevent ActiveX controls from being run in Internet Explorer. The risk is MEDIUM. An attacker who successfully exploited this vulenrability could gain the same user rights as the logged on user.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
kill(1) 						      General Commands Manual							   kill(1)

Name
       kill - send a signal to a process

Syntax
       kill [-sig] processid...
       kill -l

Description
       The command sends the TERM (terminate, 15) signal to the specified processes.  If a signal name or number preceded by `-' is given as first
       argument, that signal is sent instead of terminate.  For further information, see

       The terminate signal kills processes that do not catch the signal; `kill -9 ...' is a sure kill, as the KILL (9) signal cannot  be  caught.
       By convention, if process number 0 is specified, all members in the process group (that is, processes resulting from the current login) are
       signaled.  This works only if you use and not if you use To kill a process it must either belong to you or you must be superuser.

       The process number of an asynchronous process started with `&' is reported by the shell.  Process numbers can also be  found  by  using	It
       allows job specifiers ``%...''  so process ID's are not as often used as arguments.  See for details.

Options
       -l   Lists  signal  names.  The signal names are listed by `kill -l', and are as given in /usr/include/signal.h, stripped of the common SIG
	    prefix.

See Also
       csh(1), ps(1), kill(2), sigvec(2)

																	   kill(1)