{"vuid":"VU#992132","idnumber":"992132","name":"Microsoft Access Snapshot Viewer vulnerable to buffer overflow when validating parameters","keywords":["Microsoft","Access Snapshot Viewer","buffer overflow","validate parameters","Snapview.ocx","Q827104","MS03-038"],"overview":"A remotely exploitable vulnerability exists in the Microsoft Access Snapshot Viewer ActiveX control. Exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the local system with the privileges of the current user.","clean_desc":"According to  Microsoft's Security Bulletin MS03-038, a buffer overflow vulnerability exists in the ActiveX control that is used to view Microsoft Access databases without having Microsoft Access installed. The buffer overflow occurs in the code that validates parameters for the Snapshot Viewer control. This vulnerability can be exploited via a malicious webpage, HTML-parsed email or any application that recognizes and launches ActiveX controls. A victim must visit a malicious site, or open a malicious message to be exploited. This control is not installed by default, but can be installed with Access, or as a stand-alone control.","impact":"Exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the local system with the privileges of the current user.","resolution":"Apply the patch from Microsoft's Security Bulletin MS03-038.","workarounds":"","sysaffected":"","thanks":"Thanks to the Microsoft Security team for reporting this vulnerability.","author":"This document was written by Jason A Rafail.","public":["http://www.microsoft.com/technet/security/bulletin/MS03-038.asp","http://www.microsoft.com/security/security_bulletins/ms03-038.asp","http://www.secunia.com/advisories/9668/"],"cveids":["CVE-2003-0665"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-09-03T18:36:43Z","publicdate":"2003-09-03T00:00:00Z","datefirstpublished":"2003-09-04T18:27:36Z","dateupdated":"2003-09-04T18:27:57Z","revision":4,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"15","cam_easeofexploitation":"12","cam_attackeraccessrequired":"20","cam_scorecurrent":"16.875","cam_scorecurrentwidelyknown":"20.25","cam_scorecurrentwidelyknownexploited":"33.75","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":16.875,"vulnote":null}