Feeds

Are Microsoft ActiveX controls dangerous?

Well, yes and no...

  • alert
  • submit to reddit

The essential guide to IT transformation

Microsoft's ActiveX refers to portable, executable COM (Component Object Model) controls for Windows which are both flexible and powerful. Perhaps a bit too powerful, some would say. They run natively on a local machine rather than in a protected environment (sandbox); they can be accepted or rejected, but they cannot be assigned specific restrictions; and they always run with the same privileges as the user. They are, in short, a security gamble.

The chief difficulty is the all-or-nothing nature of the controls. If one is accepted, it simply runs, doing whatever useful task or destructive act it was designed to perform. Users are confronted with a poor, go/no go choice based solely on their willingness to trust the control's author to have done a decent job of making it safe.

An ActiveX control can indeed be signed with a relatively secure crypto scheme in which users can place a fair amount of trust that the author indicated is in fact the original one, and that the code has not been modified since it was signed.

So far so good; the problem here is that any trusted source is perfectly capable of writing appallingly bad code. While an attacker would likely be discouraged from trying to crack the signature and modify the control, a more efficient use of his time would be to look for signed controls which, in their vanilla form, contain flaws which can be exploited.

Thus an apparently safe control from the eminently trustworthy XYZ Software Corp can be applied in a malicious fashion by a clever attacker, often by use of a script which the original author had not imagined, and the hapless end user has no way of guarding against it.

The controls can be executed remotely via e-mail or a Web page. The user's only defence against malicious use is to reject all of them, or to gamble and accept only those from trusted sources. One can, of course, accept even unsigned controls if one wishes; and here we have to point out that an unsigned control is no more likely to be dangerous than a signed one is to be safe.

But at least with a signed control you know whose customer service hotline to ring up and cry to if it wipes your hard disk.

Microsoft, naturally, gushes about all the 'features' these controls make available to users. To the more cynical among us, 'feature' is mere code for 'security hole'.

With this in mind the Computer Emergency Response Team (CERT) at Carnegie Mellon University held an ActiveX workshop this Summer to shed some light on the issues, the final report from which has just been published.

It contains detailed advice for systems administrators in setting up security options, for developers in avoiding common stuff-ups which render the controls full of exploitable holes, and a section towards the end patiently explaining to Harry Homeowner how to manage ActiveX permissions on his magical mystical Windows box with minimal risk.

It's profitable reading; we recommend it. ®

The essential guide to IT transformation

More from The Register

next story
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
This is how I set about making a fortune with my own startup
Would you leave your well-paid job to chase your dream?
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.