PDA

Archiv verlassen und diese Seite im Standarddesign anzeigen : Alert - Microsoft Security Advisory 955179 Released



joneum
09.07.2008, 12:44
gestern Abend wurde folgende Sicherheitsempfehlung veröffentlicht - sie betrifft eine mögliche Schwachstelle in einem ActiveX Control des Snapshot Viewer für Microsoft Access. Weitere Infos entnehmt bitte der Mail unten.

Deutsche Informationen findet Ihr in den nächsten Tagen unter:
http://www.microsoft.com/germany/technet/sicherheit/empfehlungen/default.mspx

___________________________________________
What is the purpose of this alert?
This alert is to notify you that Microsoft has released Security Advisory 955179 - Vulnerability in the ActiveX Control for the Snapshot Viewer for Microsoft Access Could Allow Remote Code Execution - on 07 July 2008.

Summary

Microsoft is investigating active, targeted attacks leveraging a potential vulnerability in the ActiveX control for the Snapshot Viewer for Microsoft Access. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.

The ActiveX control for the Snapshot Viewer for Microsoft Access enables you to view an Access report snapshot without having the standard or run-time versions of Microsoft Office Access. The vulnerability only affects the ActiveX control for the Snapshot Viewer for Microsoft Office Access 2000, Microsoft Office Access 2002, and Microsoft Office Access 2003.

The ActiveX control is shipped with all supported versions of Microsoft Office Access except for Microsoft Office Access 2007. The ActiveX control is also shipped with the standalone Snapshot Viewer.

In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content could contain specially crafted content that could exploit this vulnerability. An attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail or Instant Messenger message that takes users to the attacker's Web site.

An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

By default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration<http://go.microsoft.com/fwlink/?LinkId=92039> (http://go.microsoft.com/fwlink/?LinkId=92039). This mode sets the security level for the Internet zone to High. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone.

Recommendations

Review Microsoft Security Advisory 955179 for an overview of the issue, details on affected components, mitigating factors, suggested actions, frequently asked questions (FAQ) and links to additional resources.

Anyone believed to have been affected can reach support online at this location:
http://www.microsoft.com/protect/support/default.mspx

Those in the United States can contact Customer Service and Support at no charge using the PC Safety hotline at 1-866-PCSAFETY. International customers can receive support from their local Microsoft subsidiaries. For more information about how to contact Microsoft for international support issues, visit the International Support landing page<http://support.microsoft.com/common/international.aspx> (http://support.microsoft.com/common/international.aspx).

Additional Resources

* Microsoft Security Advisory 955179 - Vulnerability in the ActiveX Control for the Snapshot Viewer for Microsoft Access Could Allow Remote Code Execution: http://www.microsoft.com/technet/security/advisory/955179.mspx

* MSRC Blog: http://blogs.technet.com/msrc

Regarding Information Consistency

We strive to provide you with accurate information in static (this mail) and dynamic (web-based) content. Security Advisories posted to the web are occasionally updated to reflect late-breaking information. If this results in an inconsistency between the information here and the information in the web-based Security Advisory, the information in the web-based Security Advisory is authoritative.

If you have any questions regarding this alert please contact your Technical Account Manager or Application Development Consultant.

Thank you,
Microsoft CSS Security Team