Research > Zero-Day Tracker > 20131015
Oracle Outside In Microsoft Access Remote Code Execution
Patch Not Yet Available
Oracle, Microsoft, other miscellaneous vendors
Any software that uses Oracle Outside In libraries, such as the following:
Oracle Fusion Middleware
Oracle Outside In libraries contain a stack-based buffer overflow within the Microsoft Access 1.x database file parser, which is included in Microsoft Exchange and other software packages. An attacker that specially crafts an Access 1.x database file may send that file to a vulnerable software installation and possibly gain the ability to remotely execute code.
Remote Code Execution
Exploitation of this vulnerability is possible via specially crafted Microsoft Access 1.x database files. In the case of an attack against Microsoft Exchange, an attacker would specially craft an Access 1.x database file and send it to a vulnerable Exchange server, possibly gaining the ability to arbitrarily execute code.
No mitigations are currently available.
2013-10-15 - Oracle releases the Critical Patch Update for October 2013, which discloses the vulnerability
Copyright ©1998-2011 eEye Digital Security
Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any way without express consent of eEye. If you wish to reprint the whole or any part of this alert in any other medium excluding electronic medium, please email alert@eEye.com for permission.
The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are no warranties, implied or express, with regard to this information. In no event shall the author be liable for any direct or indirect damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.