Oracle Jinitiator ActiveX control contains multiple Stack Buffer Overflows

Yesterday the US Cert published an advisory that the ActiveX control of Jinitiator and earlier contains multiple buffer overflows allowing remote code execution. Even a new installation of Jinitiator does not fix the problem because the old, vulnerable control will not be removed. The US Cert recommends to disable ActiveX or to set the appropriate killbit.

Create and execute the following textfile to set the killbit. Additional information about killbits and activeX are available in the following Microsoft support note 240797.


    Windows Registry Editor Version 5.00[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{9b935470-ad4a-11d5-b63e-00c04faedb18}]
    “Compatibility Flags”=dword:00000400


Leave a Reply

You must be logged in to post a comment.