http://www.warp2search.net/modules.php?name=News&file=article&sid=15044
Reading Further, it appears to be using the ADODB.Stream vulnerability
Sounds like the one I read about somewhere else, and prepared a regfile fix from the edit info provided.
REGEDIT4
[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{00000566-0000-0010-8000-00AA006D2EA4}]
"Compatibility Flags"=dword:00000400
----- Cut from REGEDIT4, paste to .REG file, apply - not quite sure what the 400 value is, but it's either the "kill" bit or the "unsafe" bit
As used by "Spywareblaster", which deactivates a large number of Activex controls from causing unwanted activity in Internet Explorer.
http://www.javacoolsoftware.com/spywareblaster.html
Reading Further, it appears to be using the ADODB.Stream vulnerability
Sounds like the one I read about somewhere else, and prepared a regfile fix from the edit info provided.
REGEDIT4
[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{00000566-0000-0010-8000-00AA006D2EA4}]
"Compatibility Flags"=dword:00000400
----- Cut from REGEDIT4, paste to .REG file, apply - not quite sure what the 400 value is, but it's either the "kill" bit or the "unsafe" bit
As used by "Spywareblaster", which deactivates a large number of Activex controls from causing unwanted activity in Internet Explorer.
http://www.javacoolsoftware.com/spywareblaster.html