Sophos published detection for known exploits on 6 July as Exp/VidCtl-A. The vulnerability is not only in Microsoft Video ActiveX Control but in the underlying Active Template Library (ATL) used when the control was compiled. This effectively means that any ActiveX control using similar functionality and compiled with ATL is potentially vulnerable and that there are several different attack vectors that could be used to reach the exploit condition. Two new bulletins and one advisory were published to address the potential issues hopefully more thoroughly.”]

