Vulnerability Note VU#992132

Microsoft Access Snapshot Viewer vulnerable to buffer overflow when validating parameters

Original Release date: 04 Sep 2003 | Last revised: 04 Sep 2003

Overview

A remotely exploitable vulnerability exists in the Microsoft Access Snapshot Viewer ActiveX control. Exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the local system with the privileges of the current user.

Description

According to Microsoft's Security Bulletin MS03-038, a buffer overflow vulnerability exists in the ActiveX control that is used to view Microsoft Access databases without having Microsoft Access installed. The buffer overflow occurs in the code that validates parameters for the Snapshot Viewer control. This vulnerability can be exploited via a malicious webpage, HTML-parsed email or any application that recognizes and launches ActiveX controls. A victim must visit a malicious site, or open a malicious message to be exploited. This control is not installed by default, but can be installed with Access, or as a stand-alone control.

Impact

Exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the local system with the privileges of the current user.

Solution

Apply the patch from Microsoft's Security Bulletin MS03-038.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-04 Sep 2003
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to the Microsoft Security team for reporting this vulnerability.

This document was written by Jason A Rafail.

Other Information

  • CVE IDs: CAN-2003-0665
  • Date Public: 03 Sep 2003
  • Date First Published: 04 Sep 2003
  • Date Last Updated: 04 Sep 2003
  • Severity Metric: 16.87
  • Document Revision: 3

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.