Vulnerability Note VU#992132
Microsoft Access Snapshot Viewer vulnerable to buffer overflow when validating parameters
A remotely exploitable vulnerability exists in the Microsoft Access Snapshot Viewer ActiveX control. Exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the local system with the privileges of the current user.
According to Microsoft's Security Bulletin MS03-038, a buffer overflow vulnerability exists in the ActiveX control that is used to view Microsoft Access databases without having Microsoft Access installed. The buffer overflow occurs in the code that validates parameters for the Snapshot Viewer control. This vulnerability can be exploited via a malicious webpage, HTML-parsed email or any application that recognizes and launches ActiveX controls. A victim must visit a malicious site, or open a malicious message to be exploited. This control is not installed by default, but can be installed with Access, or as a stand-alone control.
Exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the local system with the privileges of the current user.
If you are a vendor and your product is affected, let
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||04 Sep 2003|
Thanks to the Microsoft Security team for reporting this vulnerability.
This document was written by Jason A Rafail.
03 Sep 2003
Date First Published:
04 Sep 2003
Date Last Updated:
04 Sep 2003
If you have feedback, comments, or additional information about this vulnerability, please send us email.