Microsoft looks into Visual Studio bug

Updated on Friday, Aug. 15 at 5:10 p.m. EST

Microsoft is investigating a reported zero-day vulnerability that impacts Visual Studio 6, an older model of the software giant's developer tools suite.

The flaw is caused by a "Masked Edit" ActiveX control error that can be exploited to cause a stack-based buffer overflow, according to vulnerability tracking firm Secunia, which assigned a "highly critical" rating to the bug.

Users can be infected with malicious code if they visit a specially crafted rogue website that "initializes the object with an overly long 'Mask' parameter," a Secunia advisory said.

Microsoft Visual Studio 6 Enterprise, Professional and Standard editions are vulnerable, although other versions may be affected, the advisory said.

Visual Studio 6 was last updated June 2000, a Microsoft spokeswoman told SCMagazineUS.com on Friday. The version is no longer supported.

Visual Studio 2008 is the latest release, she said. The company encourages users to update to the newest version.

The flaw was reported by Symantec, according to a French Security Incident Response Team advisory.




Sign up to our newsletters

More in News

Bitcoin mining botnet has become one of the most prevalent cyber threats

Fortinet researchers have tracked 100,000 new ZeroAccess trojan infections per week, making the botnet very lucrative to its owners.

House Intelligence Committee OKs amended version of controversial CISPA

House Intelligence Committee OKs amended version of controversial ...

Despite the 18-to-2 vote in favor of the bill proposal, privacy advocates likely will not be satisfied, considering two key amendments reportedly were shot down.

Judge rules hospital can ask ISP for help in ID'ing alleged hackers

Judge rules hospital can ask ISP for help ...

The case stems from two incidents where at least one individual is accused of accessing the hospital's network to spread "defamatory" messages to employees.