JS/Exploit.CVE-2008-2463.A
Exploit kits using this vulnerability: Eleonore and Siberia.
Vulnerability details
Advisory: SB2008070701 - Remote code execution in Microsoft Access
Vulnerable component: Microsoft Office
CVE-ID: CVE-2008-2463
CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C
CWE-ID: CWE-119 - Memory corruption
Description:
The vulnerability alows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the ActiveX control for the Snapshot Viewer for Microsoft Access. A remote attacker can construct a specially crafted Web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Note: this vulnerability was being actively exploited.
Public Exploits:
- Snapshot Viewer for Microsoft Access - ActiveX Control Arbitrary File Download (Metasploit) [Exploit-DB]
- Microsoft Access - 'Snapview.ocx 10.0.5529.0' ActiveX Remote Exploit [Exploit-DB]
External links:
https://technet.microsoft.com/en-us/library/security/ms08-041.aspx
https://www.botnets.fr/wiki/CVE-2008-2463
https://blogs.technet.microsoft.com/msrc/2008/07/07/snapshot-viewer-activex-control-vulnerability/
http://www.kb.cert.org/vuls/id/837785
https://cve.circl.lu/cve/CVE-2008-2463
https://www.cnet.com/news/microsoft-fixes-26-flaws-with-11-patches-six-are-critical/