Contact Us Today! (215) 853-2266

Bardissi Enterprises Blog

Bardissi Enterprises has been serving the Hatfield area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft Patches Critical Zero Day JET Engine Vulnerability

Severity: High

13 May, 2008

Summary:

  • These vulnerabilities affect: Windows 2000, XP, and Server 2003
  • How an attacker exploits them: By enticing one of your users into opening a maliciously crafted Word (.doc) or .mdb file
  • Impact: An attacker can execute code, potentially gaining complete control of your user’s computer
  • What to do: Install the appropriate Microsoft Jet 4.0 Database Engine update immediately

Exposure:

In a security bulletin released today as part of its monthly patch update, Microsoft describes a security vulnerability in the Joint Engine Technology (JET) database engine — a database handling component that ships with Windows. The JET engine component suffers from a buffer overflow vulnerability involving the way it processes .mdb files. Although the flaw specifically lies in how Jet engine handles .mdb files, an attacker could easily embed an .mdb file into a Word document as well. So, potentially, attackers could leverage this vulnerability using booby-trapped Word documents. By enticing one of your users into downloading and opening such a document, an attacker could exploit this flaw to execute code on that user’s machine, with that user’s privileges. If the user has local administrator rights, the attacker would gain full control of the user’s machine.

Severity: High

13 May, 2008

Summary:

  • These vulnerabilities affect: Windows 2000, XP, and Server 2003
  • How an attacker exploits them: By enticing one of your users into opening a maliciously crafted Word (.doc) or .mdb file
  • Impact: An attacker can execute code, potentially gaining complete control of your user’s computer
  • What to do: Install the appropriate Microsoft Jet 4.0 Database Engine update immediately

Exposure:

In a security bulletin released today as part of its monthly patch update, Microsoft describes a security vulnerability in the Joint Engine Technology (JET) database engine — a database handling component that ships with Windows. The JET engine component suffers from a buffer overflow vulnerability involving the way it processes .mdb files. Although the flaw specifically lies in how Jet engine handles .mdb files, an attacker could easily embed an .mdb file into a Word document as well. So, potentially, attackers could leverage this vulnerability using booby-trapped Word documents. By enticing one of your users into downloading and opening such a document, an attacker could exploit this flaw to execute code on that user’s machine, with that user’s privileges. If the user has local administrator rights, the attacker would gain full control of the user’s machine.

You probably remember this flaw from a Wire post we published back in March. In that post, we warned you that malicious attackers were exploiting this previously unpatched vulnerability in the wild, in what Microsoft called, “limited, targeted attacks.” Now that Microsoft has finally fixed this vulnerability, we highly recommend you download, test, and deploy its patch immediately, before one of your users succumbs to this serious attack vector.

Solution Path:

The Microsoft Jet 4.0 Database Engine update fixes a significant issue which attackers are exploiting in the wild. You should download, test, and deploy the appropriate Microsoft Jet 4.0 Database Engine update immediately.

Microsoft Vista and Server 2008 are not affected.

For All WatchGuard Users:

While you can configure some of WatchGuard’s Firebox models to block all Word (.doc) and .mdb documents, most organizations need to allow Office documents in order to conduct business. Blocking them could bring your business to a halt. Therefore, the patches are your best recourse. Nevertheless, if you do wish to block any Office documents, follow the links below for our instructional videos on using your Firebox proxy’s content blocking features:

Status:

Microsoft has released Microsoft Jet 4.0 Database engine to fix this vulnerability.

References:

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 16 December 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Recent Comments

Tip of the Week: Which Headphones are Right for Your Needs?
23 April 2018
I will recommend Plantronics Backbeat Pro 2 SE Noise cancelling Headset with it's Great features.
Gamification: Make Business Fun for Everyone
27 January 2017
The world is based on the games. There are many types of games as per the aussie essay writing servi...
Let's Talk Tablets
12 January 2017
The concept of tablet is far better than that of PC because you can bring them with you everywhere a...
Tip of the Week: Tweak Your Workday in These 4 Ways and See Major Results
12 January 2017
The only thing will I will say regarding this blog is that it is very helpful at least for me. As I ...
WatchGuard Releases Version 10.2.7 for WSM, Edge, Fireware, and Fireware Pro
23 December 2016
I really needed to know about the fireware but i was confused that where can i find information abou...