Microsoft JET VBA Shell 漏洞

漏洞信息详情

Microsoft JET VBA Shell 漏洞

漏洞简介

Microsoft Jet数据库引擎存在漏洞。攻击者可以通过数据库请求执行命令,也称为\”VBA Shell\” 漏洞。

漏洞公告

Microsoft has made a patch available at the following url:
http://officeupdate.microsoft.com/articles/mdac_typ.htm
This was made public in a Microsoft Security Advisory published on August 20, 1999. The patch works by creating a “sandbox mode” for Jet 3.5x, and changing the implementation of sandbox mode in Jet 4.0.
An additional patch made available by Microsoft, exists at the following location:
http://office.microsoft.com/assistance/9798/mdac_typ.aspx
Also, Wanderley J. Abreu Jr. has written a program that will search the registry and modify the EditFlags value for DocObjects file types, setting the Confirm Open After Download value to 01. this means that these filetypes can no longer be silently downloaded and opened. This can be downloaded from:
http://www.securityfocus.com/data/vulnerabilities/patches/RegFix.zip
@unikey.com.br>

参考网址

来源: XF
名称: jet-vba-shell(3155)
链接:http://xforce.iss.net/static/3155.php

来源: BID
名称: 548
链接:http://www.securityfocus.com/bid/548

来源: MS
名称: MS99-030
链接:http://www.microsoft.com/technet/security/bulletin/ms99-030.asp

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享