Potential Security Vulnerability in exteNd Director Standard 4.1 with ActiveX control
This document (3169416) is provided subject to the disclaimer at the end of this document.
environment
Novell exteNd Director 4.1Microsoft Windows 2000 Professional
Microsoft Windows XP Professional
Microsoft Windows 2000
Microsoft Windows 98
Microsoft Windows 95
situation
Windows workstations that have run Novell Portal Services or Novell exteNd Director 4.1 in the past may have installed an activeX control that could potentially allow for malicious code to run on the workstation.resolution
To resolve this problem, create a text file that contains this text (NOTE: use notepad or another text editor, NOT word pad, or a word processor), here's the text:Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{2B1AA38D-2D12-11D5-AAD0-00C04FA03D78}]
"Compatibility Flags"=dword:00000400
Save the text file and rename it to Novell-Killbit.regĀ (make sure that it doesn't have a .txt hidden extension)
Next, double click on the .reg file just created, and when prompted to add to the registry, click Yes
The above entry disables the particular activeX control that was at one time used by Novell exteNd Director Standard Edition 4.1
status
Reported to EngineeringSecurity Alert
additional notes
internal information
document
Document ID: | 3169416 |
Creation Date: | 2007-06-15 11:09:37.0 |
Modified Date: | 2007-06-15 11:09:37.0 |
Novell Product: | exteNd Director |
disclaimer
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.