US-CERT: hackers are attacking flaw in Microsoft Access

The US Computer Emergency Readiness Team (US-CERT) has warned that hackers are actively targeting a security flaw in the Microsoft Access system.

The US Computer Emergency Readiness Team (US-CERT) has warned that hackers are actively targeting a security flaw in the Microsoft Access system.

The government security agency says it is aware of a stack buffer overflow vulnerability in the way that Microsoft Access handles specially crafted database files.

Opening a specially crafted Microsoft Access Database file (".MDB") can cause arbitrary code execution without requiring any additional user interaction, said CERT.

As Microsoft Access files are considered to be high-risk, it may also be possible to execute arbitrary code without using a vulnerability in Microsoft Access, said CERT.

"US-CERT is aware of active exploitation using malicious Microsoft Access databases," said the agency.

CERT said users should not open attachments from unsolicited e-mail messages, and should block high-risk file attachments at e-mail gateways.




CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Antivirus, firewall and IDS products

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close