US-CERT is warning the weaknesses may allow an attacker to execute remote code without additional user interaction.
By Thomas Claburn InformationWeek December 12, 2007 01:50 PM
The United States Computer Emergency Readiness Team (US-CERT) this week issued two warnings about public exploit code.
On Monday, the government security group said that there's a stack buffer overflow vulnerability in the way that Microsoft (NSDQ: MSFT) Access handles Microsoft Access Database (.MDB) files. Opening maliciously-crafted .MDB files may allow an attacker to execute remote code without additional user interaction, the group said.
US-CERT did not provide details beyond stating that the vulnerability was being actively exploited. A proof-of-concept exploit has been available since November 16.
Microsoft considers .MDB files to be unsafe, along with many other file types. "Microsoft customers should be aware that opening unsafe types of files could cause malicious damage to computer systems," the company states in its support documentation. "These files could contain viruses or Trojan horse programs and could be used to alter or to delete information that is stored on the computer. These files could also be used to send information that is stored on a computer to other computers. We recommend that customers only open these types of files after customers verify that the sender is trustworthy and that the sender intentionally sent the file."
Some of the files types Microsoft classifies as unsafe are: program files (*.exe), batch files (*.cmd and *.bat), script files (*.vbs and *.js), Microsoft Access files (*.mdb) and macros in Microsoft Word files (*.doc) or in Microsoft Excel files (*.xls). The Microsoft Access stack buffer overflow vulnerability was not among those Microsoft fixed on December 11 in its monthly security patch bulletin.
On Wednesday, US-CERT said it was also aware of reports of a possible vulnerability in the HP (NYSE: HP) Info Center Software found on HP Laptops. The group said that the flaw could allow an attacker to execute remote code on the affected laptop or alter the laptop's system registry.
A proof-of-concept exploit for the HP software flaw was posted on Tuesday.
Thursday, December 13, 2007
Subscribe to:
Post Comments (Atom)
Blog Archive
-
▼
2007
(37)
-
▼
December
(37)
- NATO Reps Meet in Scotland to Discuss Afghanistan
- Two California men enter guilty pleas on terror ch...
- Mudslide closes Oregon Highway 30 after dam breaks
- Work begins on Chain of Rocks levee berms
- Agencies monitor air quality; officials consider e...
- Young, poor prefer cell phones
- Ohio gets the message on data breaches
- Three critical fixes star in Microsoft patch
- US-CERT: Attackers targeting Microsoft Access files
- FEMA to host joint influenza pandemic exercise
- Improving emergency response
- Hastings High opens late after second bomb scare
- Hunters cause lockdown of five Walton County schools
- Fort Dix attack plot suspects promoting terror in ...
- Glaxo diabetes drug raises heart risk in study
- China launches drug recall system
- Parts of Newport Harbor closed after sewage spill
- Sewage spill dumps 40,000 gallons into Loch Raven ...
- Arizona health officials track salmonella flare-up
- USDA seeks potato pest in Nebraska, 7 other states
- GAO to USPS: Address database errors
- New screening machine sees your carry-on in 3-D
- FAA officials say JFK planes were not close to col...
- New tax scam targets West Alabama counties
- New scam offers businesses chance to have companie...
- Computer simulates nuclear reactors
- Pilgrim nuclear plant shut down for replacement of...
- 30 workers evacuated after chemical spill in Bridg...
- University of Massachusetts establishes new chemic...
- Exxon to put floating gas plant off N.J. coast
- Duke Energy moves ahead with plans for new nuclear...
- Oklahoma utility crews making a dent in power outa...
- DOE Lab Hacked
- Software Vendors Accuse Prestigious Law Firm Of Pi...
- Vulnerabilities Found In Microsoft Access And HP L...
- AT&T Offers Schools RFID Tracking For People And A...
- Insiders Remain Greatest Security Threat
-
▼
December
(37)
No comments:
Post a Comment