Site Network: Beskerming.com | Skiifwrald.com | Jongsma & Jongsma

Security for All

Sûnnet Beskerming is a company with a focus and a drive to provide Information Security services for all those who want to stay safe and secure in an online world.

Username: | Password: Contact us to request an account

Microsoft JET - Remote hacker manual control

Version: 4.0 and prior.
Technical Details:

A file parsing stack overflow vulnerability has been discovered in Microsoft's JET implementation (as shipped with Microsoft Office 2003), allowing for arbitrary code execution once the victim interacts with a malicious JET-dependent file (such as an Access file).

Sample exploit code is readily available. The discoverer points out that some web hosting services will be vulnerable, as .asp and .mdb files can act as a vehicle for this vulnerability - which is then activated through a "ADODB.Connection".

Description:

Even though it has been deprecated in favour of the SQL Server 2005 Compact and Express Editions, many applications still require JET-style database access. A remote code execution vulnerability has been discovered with JET, as supplied with Microsoft Office 2003, complete with detailed vulnerability breakdown and sample exploit code.

Microsoft have indicated to the discoverer that they will not be patching the vulnerability as it has been discovered and demonstrated. The discoverer points out that some web hosting services will be vulnerable, as .asp and .mdb files can act as a vehicle for this vulnerability - which is then activated through a "ADODB.Connection".

Mitigation:

Consider updating requirements for JET support to one of the SQL Server 2005 editions, and be cautious about interacting with Access and other JET-dependent files from unexpected sources.

Updates:

Will not be made available

Source:

http://ruder.cdut.net/blogview.asp?logID=227

Exploits:

http://ruder.cdut.net/blogview.asp?logID=227

External Tracking Data:

Not yet Available


Social bookmark this page