[11443] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Microsoft JET/Office Vulnerability Exploit

daemon@ATHENA.MIT.EDU (Ben Greenbaum)
Fri Aug 20 20:11:48 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.GSO.4.05.9908181255360.21491-100000@www.securityfocus.com>
Date:         Wed, 18 Aug 1999 12:59:35 -0700
Reply-To: Ben Greenbaum <beng@SECURITYFOCUS.COM>
From: Ben Greenbaum <beng@SECURITYFOCUS.COM>
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <19990818122628.R16889@securityfocus.com>

Just a reminder, there are workarounds to solve this.
Cut-n-pasted from the vulnerability listing:

MDAC 2.1 includes the JET 4.0 driver which is not affected by this
 vulnerability. It is available for download at:
 http://www.microsoft.com/data/download.htm

 Also, Wanderley J. Abreu Jr. <storm@UNIKEY.COM.BR> has written a
 program that will search the registry and modify the EditFlags value for
 DocObjects file types, setting the Confirm Open After Download value to
 01. this means that these filetypes can no longer be silently downloaded
 and opened. This can be downloaded from:
 http://www.securityfocus.com/data/vulnerabilities/patches/RegFix.zip

Ben Greenbaum
SecurityFocus
www.securityfocus.com

home help back first fref pref prev next nref lref last post