CERTA-2004-AVI-129

Vulnerability from certfr_avis - Published: - Updated:

None

Description

Jet est un moteur de base de données, composant de Windows. Il peut être installé par des applications telles que Microsoft Access ou Microsoft Visual Basic, et d'autres applications. Jet est installé sur un système si la bibliothèque msjet40.dll y est présente.

Une vulnérabilité de type débordement de mémoire dans Jet permet à un individu mal intentionné de prendre le contrôle à distance d'un système vulnérable.

Solution

Télécharger le correctif disponible sur le site de l'éditeur (cf. section Documentation).

None
Impacted products
Vendor Product Description
Microsoft Windows Windows NT Workstation 4.0 ;
Microsoft Windows Windows XP ;
Microsoft Windows Windows NT Server 4.0 ;
Microsoft Windows Windows 2000 ;
Microsoft Windows Windows NT Server 4.0, Terminal Server Edition ;
Microsoft Windows Windows Server 2003.
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Windows NT Workstation 4.0 ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows XP ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows NT Server 4.0 ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 2000 ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows NT Server 4.0, Terminal Server Edition ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2003.",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nJet est un moteur de base de donn\u00e9es, composant de Windows. Il peut \u00eatre\ninstall\u00e9 par des applications telles que Microsoft Access ou Microsoft\nVisual Basic, et d\u0027autres applications. Jet est install\u00e9 sur un syst\u00e8me\nsi la biblioth\u00e8que msjet40.dll y est pr\u00e9sente.\n\nUne vuln\u00e9rabilit\u00e9 de type d\u00e9bordement de m\u00e9moire dans Jet permet \u00e0 un\nindividu mal intentionn\u00e9 de prendre le contr\u00f4le \u00e0 distance d\u0027un syst\u00e8me\nvuln\u00e9rable.\n\n## Solution\n\nT\u00e9l\u00e9charger le correctif disponible sur le site de l\u0027\u00e9diteur (cf.\nsection Documentation).\n",
  "cves": [],
  "links": [
    {
      "title": "R\u00e9f\u00e9rence CVE : CAN-2004-0197 :",
      "url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0197"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS04-014 :",
      "url": "http://www.microsoft.com/technet/security/bulletin/ms04-014.mspx"
    }
  ],
  "reference": "CERTA-2004-AVI-129",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2004-04-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": null,
  "title": "Vuln\u00e9rabilit\u00e9 dans le moteur de base de donn\u00e9es Microsoft Jet",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de S\u00e9curit\u00e9 Microsoft MS04-014",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…