(US-CERT Issues Advisory) Microsoft Access Snapshot Viewer ActiveX Control Lets Remote Users Download Files to Arbitrary Locations
SecurityTracker Alert ID: 1020434|
SecurityTracker URL: http://securitytracker.com/id/1020434
(Links to External Site)
Updated: Aug 12 2008|
Original Entry Date: Jul 8 2008
Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via network|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 2000, 2002, 2003|
A vulnerability was reported in Microsoft Access in the Snapshot Viewer ActiveX control. A remote user can cause arbitrary code to be downloaded and then later executed on the target user's system.|
A remote user can create specially crafted HTML that, when loaded by the target user, will invoke the 'snapview.ocx' ActiveX control and download arbitrary files to arbitrary locations on the target user's system. The files can then be subsequently executed.
The CLSIDs of the vulnerable control are: F0E42D50-368C-11D0-AD81-00A0C90DC8D9, F0E42D60-368C-11D0-AD81-00A0C90DC8D9, and F2175210-368C-11D0-AD81-00A0C90DC8D9
Microsoft Office Access 2000, Microsoft Office Access 2002, and Microsoft Office Access 2003 are affected.
Snapshot Viewer for Microsoft Access is affected.
This vulnerability is being actively exploited.
A remote user can create HTML that, when loaded by the target user, will download files to the target user's system. The files can then be later executed.|
The vendor has issued the following fixes:|
Microsoft Office Access 2000 Service Pack 3:
Microsoft Office Access 2002 Service Pack 3:
Microsoft Office Access 2003 Service Pack 2 and Microsoft Office Access 2003 Service Pack 3:
A restart is not required.
The Microsoft advisory is available at:
US-CERT had previously issued an advisory containing workaround recommendations:
Vendor URL: www.microsoft.com/technet/security/bulletin/ms08-041.mspx (Links to External Site)
Access control error|
|Underlying OS: Windows (Any)|
This archive entry is a follow-up to the message listed below.|
Source Message Contents
Subject: US-CERT Technical Cyber Security Alert TA08-189A -- Microsoft Office Snapshot Viewer ActiveX Vulnerability|
-----BEGIN PGP SIGNED MESSAGE-----
National Cyber Alert System
Technical Cyber Security Alert TA08-189A
Microsoft Office Snapshot Viewer ActiveX Vulnerability
Original release date: July 7, 2008
Last revised: --
* Microsoft Office Access 2000
* Microsoft Office Access XP
* Microsoft Office Access 2003
* Microsoft Office Snapshot Viewer
An unpatched vulnerability in the Microsoft Office Snapshot Viewer ActiveX
control is being used in attacks.
Microsoft has released Security Advisory (955179) to describe attacks on a
vulnerability in the Microsoft Office Snapshot Viewer ActiveX control.
Because no fix is currently available for this vulnerability, please see the
Security Advisory and US-CERT Vulnerability Note VU#837785 for workarounds.
A remote, unauthenticated attacker could execute arbitrary code.
Microsoft has provided workarounds for this vulnerability in Security
Advisory (955179). Additional details and workarounds are provided in
US-CERT Vulnerability Note VU#837785.
The most effective workaround for this vulnerability is to set kill bits for
the Snapshot Viewer ActiveX control, as outlined in the documents noted
above. Other workarounds include disabling ActiveX, as specified in the
Securing Your Web Browser document, and upgrading to Internet Explorer 7,
which can help mitigate the vulnerability with its ActiveX opt-in feature.
* US-CERT Vulnerability Note VU#837785 -
* Microsoft Security Advisory (955179) -
* Securing Your Web Browser -
The most recent version of this document can be found at:
Feedback can be directed to US-CERT Technical Staff. Please send
email to <firstname.lastname@example.org> with "TA08-189A Feedback VU#837785" in the
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
Produced 2008 by US-CERT, a government organization.
July 7, 2008: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
-----END PGP SIGNATURE-----