Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2019-0599: Jet Database Engine Remote Code Execution Vulnerability

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Microsoft CVE-2019-0599: Jet Database Engine Remote Code Execution Vulnerability

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
02/12/2019
Created
03/19/2019
Added
02/12/2019
Modified
11/18/2021

Description

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.

Solution(s)

  • msft-kb4486564-11fbac8f-a728-4e04-8372-8cddd6574ab0
  • msft-kb4486564-7fbfe52a-2daf-44e1-a302-23301cbf4a23
  • msft-kb4486564-85229e47-cf6f-468c-929d-a35cd8c7429f
  • msft-kb4486564-f550e112-2700-4bf2-a35f-92e3fecabe4e
  • msft-kb4486564-fb886c0e-d5c2-439e-afd9-d6ff4fc7c211
  • msft-kb4486564-fd4d0cb3-e518-47b9-8f3c-6df6b338e56a
  • msft-kb4486993-440f0748-a8f5-41a4-b3ed-ecdd0c8bdc63
  • msft-kb4486993-5a996d53-fc95-4966-9610-84d959807d5f
  • msft-kb4486993-a2e58465-7d64-45ec-bb9e-1c26d4e6ed4b
  • msft-kb4486996-276d9f15-a4ba-4682-88aa-dbc6a7dd6473
  • msft-kb4486996-48e7b820-42a1-48df-8c60-3cc793715032
  • msft-kb4486996-a54c01ab-09c3-44d8-a43e-43ae56ec00f3
  • msft-kb4487017-048720ff-774b-4d24-bfab-5066f09875c2
  • msft-kb4487017-0b675ccd-56fb-4169-9bb7-c693c34667fe
  • msft-kb4487017-79e70bc9-237e-4486-9ac8-dd8a85880a4e
  • msft-kb4487018-30238546-bfa6-4811-a777-9f9195330949
  • msft-kb4487018-cb3d541d-3e9a-46ac-a99c-9de153b7a8be
  • msft-kb4487019-315a75ce-db3f-4064-96bb-47870282c3e2
  • msft-kb4487019-784c5fee-e524-4f80-a62d-4e2431fd0096
  • msft-kb4487019-fda7b4e6-5280-4fd1-819c-c55e67f69009
  • msft-kb4487020-326ccfdc-ae78-46a1-b874-6bfdec44e711
  • msft-kb4487020-d60c8faf-aa56-4418-9e62-18581894cb5e
  • msft-kb4487026-3c1ae2cf-5238-4010-a0ae-585b4fdad784
  • msft-kb4487026-85c7e18d-15ca-473b-95a6-ca8c98f8309a
  • msft-kb4487026-b21493c2-2162-4783-8997-149684faf4f5
  • msft-kb4487028-0b256bc7-170d-4ee7-a993-8e9fac37a589
  • msft-kb4487028-475e8ece-4ef7-4eee-971e-572fd822b57b
  • msft-kb4487028-e5090f1a-2ee0-441f-9463-d61d9aba3d53
  • msft-kb4487044-6c65ef6d-dadd-42aa-964d-9d2518a6c5da
  • msft-kb4487044-7bd7b9f5-36c8-424f-afbc-1756008de158
  • msft-kb4487044-db969415-41ab-4f72-bdff-33d8e4e5e7ea

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;