---------------------------------------------------------------------- Want a new IT Security job? Vacant positions at Secunia: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Microsoft Jet Database Engine Database File Parsing Vulnerability SECUNIA ADVISORY ID: SA14896 VERIFY ADVISORY: http://secunia.com/advisories/14896/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Microsoft Windows XP Professional http://secunia.com/product/22/ Microsoft Windows XP Home Edition http://secunia.com/product/16/ Microsoft Windows 2000 Server http://secunia.com/product/20/ Microsoft Windows 2000 Professional http://secunia.com/product/1/ Microsoft Windows 2000 Advanced Server http://secunia.com/product/21/ Microsoft Windows 2000 Datacenter Server http://secunia.com/product/1177/ SOFTWARE: Microsoft Office 2003 Standard Edition http://secunia.com/product/2275/ Microsoft Access 2000 http://secunia.com/product/36/ Microsoft Access 2002 http://secunia.com/product/35/ Microsoft Access 2003 http://secunia.com/product/4904/ Microsoft Office 2000 http://secunia.com/product/24/ Microsoft Office 2003 Professional Edition http://secunia.com/product/2276/ Microsoft Office 2003 Small Business Edition http://secunia.com/product/2277/ DESCRIPTION: HexView has discovered a vulnerability in Microsoft Jet Database Engine, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a memory handling error when e.g. parsing database files. This can be exploited to execute arbitrary code by tricking a user into opening a specially crafted ".mdb" file in Microsoft Access. NOTE: Exploit code has been posted to a public mailing list. The vulnerability has been confirmed on a fully patched system with Microsoft Access 2003 (msjet40.dll version 4.00.8618.0) and Microsoft Windows XP SP1/SP2. Other versions may also be affected. SOLUTION: Do not open untrusted ".mdb" database files. PROVIDED AND/OR DISCOVERED BY: HexView ORIGINAL ADVISORY: http://www.hexview.com/docs/20050331-1.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------