MS Access 2/2

Gail E. Kampmeier gkamp at UIUC.EDU
Mon Aug 21 13:16:08 CDT 2000


III. Solution

Apply the patch provided by Microsoft

   Microsoft has released the following patch which addresses the "IE
   Script" vulnerability, as well as others:

        http://www.microsoft.com/windows/ie/download/critical/patch11.htm

   Please see MS00-055 "Patch Available for 'Scriptlet Rendering'
   Vulnerability" for additional information regarding other issues
   addressed by this patch:

        http://www.microsoft.com/technet/security/bulletin/ms00-055.asp

   Note that the OBJECT tag issues addressed by MS00-049, MS00-055, and
   this advisory are separate from those addressed by the recently
   released MS00-056: "Patch Available for 'Microsoft Office HTML Object
   Tag' Vulnerability."

   Microsoft's initial workaround for this issue was for users to set the
   Admin password for Access. Since Access does not allow a user to
   disable VBA code embedded in Access data and project files, the CERT
   Coordination Center recommends that users follow the suggested
   workaround and set the Admin password even after the patch for this
   vulnerability has been applied.

   Appendix A contains information provided by vendors for this advisory.
   We will update the appendix as we receive more information. If you do
   not see your vendor's name, the CERT/CC did not hear from that vendor.
   Please contact your vendor directly.

Appendix A. Vendor Information

Microsoft Corporation

   Microsoft has published the following documents regarding this issue:

        http://www.microsoft.com/technet/security/bulletin/ms00-049.asp
        http://www.microsoft.com/technet/security/bulletin/fq00-049.asp
        http://www.microsoft.com/technet/support/kb.asp?ID=269368

Appendix B. Additional Information

   The full list of OBJECT tag extensions which may be used to exploit
   this vulnerability is listed below:

     * .adp - Microsoft Access project file
     * .ade - ADP file with all modules compiled and all editable source
              code removed

     * .mdb - Microsoft Access database file
     * .mde - MDB file with all modules compiled and all editable source
              code removed
     * .mda - Microsoft Access VBA add-in

     * .mdw - Microsoft Access workgroup information file synonym for
              the system database used to store group and user account
              names and the passwords used to authenticate users when
              they log on to an Access database or MDE file secured
              with user-level security

   The patch provided by Microsoft addresses all the file extensions
   identified above.

   Please consult the following resources for further information
   regarding the other file types involved in exploited this
   vulnerability:

     * http://www.microsoft.com/office/ork/2000/appndx/glossary.htm#adefile
     * http://www.microsoft.com/office/ork/2000/appndx/glossary.htm#adpfile
     * http://msdn.microsoft.com/library/officedev/off2000/defAddIn.htm
     * http://www.microsoft.com/office/ork/2000/appndx/glossary.htm#mdbfile
     * http://www.microsoft.com/office/ork/2000/appndx/glossary.htm#mdefile
     *

http://www.microsoft.com/office/ork/2000/appndx/glossary.htm#workgroupinformatio
nfile
       _____________________________________________________________

       The CERT Coordination Center thanks Timothy Mullen, Alan Paller
       and the SANS Research Office, and the Microsoft Security Response
       Center for their help in developing this advisory.
       _____________________________________________________________

       Author: Jeffrey S. Havrilla
       __________________________________________________________________

       This document is available from:

            http://www.cert.org/advisories/CA-2000-16.html
       __________________________________________________________________

CERT/CC Contact Information

       Email: cert at cert.org
                Phone: +1 412-268-7090 (24-hour hotline)
                Fax: +1 412-268-6989
                Postal address:
                CERT Coordination Center
                Software Engineering Institute
                Carnegie Mellon University
                Pittsburgh PA 15213-3890
                U.S.A.

       CERT personnel answer the hotline 08:00-20:00 EST(GMT-5) /
       EDT(GMT-4) Monday through Friday; they are on call for emergencies
       during other hours, on U.S. holidays, and on weekends.

Using encryption

       We strongly urge you to encrypt sensitive information sent by
       email. Our public PGP key is available from

        http://www.cert.org/CERT_PGP.key

       If you prefer to use DES, please call the CERT hotline for more
       information.

Getting security information

       CERT publications and other security information are available
       from our web site

        http://www.cert.org/

       To be added to our mailing list for advisories and bulletins,
       send email to cert-advisory-request at cert.org and include
       SUBSCRIBE your-email-address in the subject of your message.

 * "CERT" and "CERT Coordination Center" are registered in the U.S.
   Patent and Trademark Office.
   ______________________________________________________________________

   NO WARRANTY
   Any material furnished by Carnegie Mellon University and the Software
   Engineering Institute is furnished on an "as is" basis. Carnegie
   Mellon University makes no warranties of any kind, either expressed or
   implied as to any matter including, but not limited to, warranty of
   fitness for a particular purpose or merchantability, exclusivity or
   results obtained from use of the material. Carnegie Mellon University
   does not make any warranty of any kind with respect to freedom from
   patent, trademark, or copyright infringement.
     _________________________________________________________________

   Conditions for use, disclaimers, and sponsorship information

   Copyright 2000 Carnegie Mellon University.

   Revision History

   August 11, 2000:  Initial release
=======
Gail E. Kampmeier, Research Entomologist, Illinois Natural History Survey,
Box 5 NSRC, MC-637, 1101 W. Peabody, Urbana, IL 61801 USA
ph. 217-333-2824; fax 217-333-6784; email: gkamp at uiuc.edu
http://www.inhs.uiuc.edu/cee/therevid/gkamp.html
=======




More information about the Taxacom mailing list