S-256: Security Update of ActiveX Kill Bits


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-256: Security Update of ActiveX Kill Bits
# 1  
Old 04-09-2008
S-256: Security Update of ActiveX Kill Bits

A remote code execution vulnerability exists in the ActiveX control hxvz.dll and an update that includes kill bits that will prevent ActiveX controls from being run in Internet Explorer. The risk is MEDIUM. An attacker who successfully exploited this vulenrability could gain the same user rights as the logged on user.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
KILL(2) 							System Calls Manual							   KILL(2)

NAME
kill - send signal to a process SYNOPSIS
kill(pid, sig); DESCRIPTION
Kill sends the signal sig to the process specified by the process number in r0. See signal(2) for a list of signals. The sending and receiving processes must have the same effective user ID, otherwise this call is restricted to the super-user. If the process number is 0, the signal is sent to all other processes in the sender's process group; see tty(4). If the process number is -1, and the user is the super-user, the signal is broadcast universally except to processes 0 and 1, the scheduler and initialization processes, see init(8). Processes may send signals to themselves. SEE ALSO
signal(2), kill(1) DIAGNOSTICS
Zero is returned if the process is killed; -1 is returned if the process does not have the same effective user ID and the user is not super-user, or if the process does not exist. ASSEMBLER
(kill = 37.) (process number in r0) sys kill; sig KILL(2)