|Check Point Reference:||CPAI-2013-3688|
|Date Published:||22 Dec 2013|
|Protection Provided by:||
|Who is Vulnerable?|| Microsoft Access 2007 |
Microsoft Access 2010
Microsoft Access 2013
|Vulnerability Description||A remote code execution vulnerability exists in Microsoft Access.|
|Update/Patch Avaliable||Apply patches from: MS13-074|
|Vulnerability Details||The vulnerability is due to an error in the way that Microsoft Access parses ACCDB files. Remote attackers can exploit this vulnerability by enticing a target user to open a specially crafted ACCDB (.accdb) file with the vulnerable version of the software. Successful exploitation of this vulnerability would allow for arbitrary code injection and execution with the privileges of the currently logged on user.|
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
- In the IPS tab, click Protections and find the Microsoft Access Memory Corruption (MS13-074) protection using the Search tool and Edit the protection's settings.
- Install policy on all modules.
SmartView Tracker will log the following entries:
Attack Name: Content Protection Violation
Attack Information: Microsoft Access Memory Corruption (MS13-074)