Check Point Reference: | CPAI-2005-218 |
Date Published: | 6 Oct 2009 |
Severity: | High |
Last Updated: | Thursday 04 June, 2015 |
Source: | |
Industry Reference: | CVE-2005-0944 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Microsoft Jet is a database engine developed by Microsoft Corporation for use within their products and third-party products. Some products that use Microsoft Jet are Microsoft Access, Microsoft Visual Basic, Microsoft C++ and Microsoft Excel. Microsoft Jet is designed for desktop application data storage and retrieval. This gives desktop users the ability to create and manipulate databases on a local workstation. A vulnerability exists in Microsoft Jet Engine mdb database file parser. The flaw is triggered when a specially constructed mdb file is opened by the vulnerable component. This vulnerability can be exploited to execute arbitrary code on a targeted system with the privileges of the currently logged in user. In an attack scenario, where arbitrary code is attempted to be injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate as a result of the attack attempt. If unexpected termination of the vulnerable application is the sole result of an attack, it has no impact on the overall operation of the attacked host. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Database Protection Violation.
Attack Information: Microsoft Jet DB Engine buffer overflow