Microsoft's speech-control engines have been hit by major security flaws, according to researchers.
Microsoft Speech is the company's software for voice recognition and text-to-voice, a technology the company is modernising with the acquisition of Tellme Networks a month ago. Besides allowing visually impaired users to interact with Windows, the technology is designed to run automated telephone response systems.
The ActiveX controls used by Microsoft Speech version 4.0a to interact with Internet Explorer, xlisten.dll and xvoice.dll, could be exploited by a specially crafted ActiveX object triggering memory corruption, according to researchers. This corruption could allow attackers to take full control of a victim's system, according to Fortinet, which discovered the xvoice.dll bug.
The controls are used by Internet Explorer 7 and older versions.
According to some industry observers, such vulnerabilities - affecting client-side software rather than servers - are becoming the primary target of attackers.
"We're in the midst of a revolution as attackers shift their focus from gaping server side vulnerabilities, which are becoming increasingly rare, to stealthy client side holes that make phishers salivate," said SPI Dynamics security evangelist Michael Sutton in a blog post. "This month's patches illustrated that we need to focus our efforts on better securing client side applications as there is a plethora of holes ripe for exploitation."
The bug was one of the many critical flaws patched with Microsoft's monthly security update on Tuesday. The update included a large number of critical flaws, including the first Vista-only patches, and security experts haven't come to a consensus on which should be patched first.