Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2019-0583: Jet Database Engine Remote Code Execution Vulnerability

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Microsoft CVE-2019-0583: Jet Database Engine Remote Code Execution Vulnerability

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
01/08/2019
Created
03/19/2019
Added
01/08/2019
Modified
11/18/2021

Description

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.

Solution(s)

  • msft-kb4480116-083a81e3-77a5-43c9-8aa4-0ccabdfab8bb
  • msft-kb4480116-7456a86e-b5aa-4e21-80a5-754b610304b5
  • msft-kb4480116-e854d6ac-aaca-45b2-9453-317a8ea4a3a8
  • msft-kb4480957-6f9b8486-4d38-4bc4-ad03-8e3037415f01
  • msft-kb4480957-b521afd4-6c65-4317-9a71-08981946bdcf
  • msft-kb4480957-c3cb8f36-9667-4d3e-8a05-6bb7dc337bbf
  • msft-kb4480960-0717638d-8d87-4a35-ba95-cb3e4e789489
  • msft-kb4480960-6f077284-29a0-414a-91de-83d7b3079948
  • msft-kb4480960-98c08198-f641-485e-91d4-f8bc10f1bb06
  • msft-kb4480960-ac054641-c54b-46d0-80d1-847d58d251c1
  • msft-kb4480960-df37c0f1-a1c5-4bc4-a118-5b04d290a958
  • msft-kb4480960-ee7299f8-fcd3-42cc-b755-75a6a2effc31
  • msft-kb4480961-4a2a5643-5e82-4339-be74-66b10a9d4eec
  • msft-kb4480961-84fbaa81-9ebf-428e-b18a-7480e4b70fb1
  • msft-kb4480961-cdd721b7-c3ac-463c-a451-2bd23b6d1a8a
  • msft-kb4480962-18f8720a-e358-4431-8ec7-1738dfe8162f
  • msft-kb4480962-7727f4a3-1b2d-4e0c-abf1-f0a8c2005e9d
  • msft-kb4480964-45e80aae-4277-4c87-bd05-5cc8c6dd672e
  • msft-kb4480964-4b75577c-5925-442f-86e1-a40b3a551bb2
  • msft-kb4480964-5793418b-be45-43da-bba9-ecf5e0f9460b
  • msft-kb4480966-0f4e1a46-e19e-4791-af14-f2559f7e4e7c
  • msft-kb4480966-5070d66b-941f-462c-a205-bd52080b062c
  • msft-kb4480966-f4207677-23a0-4a38-97d8-a2435d809a1d
  • msft-kb4480972-9b2ec529-de15-4b19-b8bf-83a138788f48
  • msft-kb4480972-e09a9ecc-6162-4868-bc33-356894c22c58
  • msft-kb4480972-f62bc0ab-6e46-442a-babc-d4b98cbfc521
  • msft-kb4480973-6e2d3ec0-a14d-4347-a8c3-fa37bf45fe5a
  • msft-kb4480973-cddccaec-10fd-460c-8e1a-01d7a000ea81
  • msft-kb4480978-95561fee-7f78-41af-b2e9-c77d7fc09d13
  • msft-kb4480978-c68a2d65-ad1f-41b3-ad82-689617db1f2d
  • msft-kb4480978-f213579e-a732-4e9b-ad16-75649512210e

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;