The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  ActiveX Kill Bit Can Be Bypassed - Another Reason to Apply MS05-054?
Time: 19:41 EST/00:41 GMT | News Source: SecurityTracker | Posted By: John Quigley

ISC reader Juha-Matti Laurio pointed out a new vulnerability note VU#998297, published by US-CERT on January 26, 2006, which states that a malicious website can bypass an ActiveX kill bit by taking advantage of a bug in Internet Explorer. A kill bit is a registry setting that prevents Internet Explorer from running the corresponding ActiveX control even if the control is installed on the system. It is not uncommon to proactively set kill bits for known malicious ActiveX controls as part of a spyware-prevention effort. For example, the SpywareGuide website provides a freely downloadable .REG file for setting kill bits of many "dubious" ActiveX controls.

Write Comment
Return to News

  Displaying 776 through 776 of 776
Prev | First
  The time now is 11:06:46 AM ET.
Any comment problems? E-mail us
#776 By 4240821 (82.115.4.100) at 1/7/2026 1:41:50 AM
https://www.pillowfort.social/posts/6893270
https://www.pillowfort.social/posts/6893101
https://www.pillowfort.social/posts/6893015
https://www.pillowfort.social/posts/6892955
https://www.pillowfort.social/posts/6892895
https://www.pillowfort.social/posts/6892823
https://www.pillowfort.social/posts/6892689
https://www.pillowfort.social/posts/6892638
https://www.pillowfort.social/posts/6892558
https://www.pillowfort.social/posts/6892505

Write Comment
Return to News
  Displaying 776 through 776 of 776
Prev | First
  The time now is 11:06:46 AM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *