Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2020-16924: Jet Database Engine Remote Code Execution Vulnerability

Back to Search

Microsoft CVE-2020-16924: Jet Database Engine Remote Code Execution Vulnerability

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
10/13/2020
Created
10/14/2020
Added
10/13/2020
Modified
11/18/2021

Description

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.

Solution(s)

  • msft-kb4577668-79a95e38-d1bc-434b-8a49-eb0e05941333
  • msft-kb4577668-965a8ede-1eb7-46d6-83a6-7246ea98aae0
  • msft-kb4577668-b815915f-3e4f-46ae-adc9-b90cd4b04100
  • msft-kb4577671-4bc3ccc3-fcb0-4bbd-a2a5-cbbd40369d41
  • msft-kb4577671-60a68333-26ce-47b6-9254-89d69caedfdf
  • msft-kb4577671-a4f7dcc3-65f1-4a75-8635-ea596100c299
  • msft-kb4577671-c4223a46-1f35-41d8-ac8e-d2772d017f90
  • msft-kb4577671-c42dc613-fb5b-4c45-925c-4f508584a635
  • msft-kb4577671-ddbf4c81-6ca7-4986-999e-9275ef508017
  • msft-kb4579311-d5cbc800-cb34-49c3-bde8-aa2f0ee05b2e
  • msft-kb4579311-e9f0550d-b150-4eeb-bf5e-1a08b117e7af
  • msft-kb4579311-fa30a6bc-24ef-47b0-a6fa-d7971053e058
  • msft-kb4580327-b12a0c5e-6811-4f83-aa52-963c9a1b7122
  • msft-kb4580327-b4113e8c-1aae-4018-b2a1-765dd1bcd9d2
  • msft-kb4580328-ebb00bd7-bff6-4567-8b7c-300728513137
  • msft-kb4580328-f01aa891-eec2-4390-9974-dc226f4d6bf4
  • msft-kb4580330-c2c988c8-cbbe-4a10-a26f-365b656443f3
  • msft-kb4580330-fc2b1c51-dad6-4170-ba4d-85c43ed047d1
  • msft-kb4580346-9b324858-4775-435e-b63f-a21d81976473
  • msft-kb4580346-a33fefeb-b078-4cde-b9b9-f3473007bef2
  • msft-kb4580346-d0112564-f9f1-4bc0-a077-6510a9918638
  • msft-kb4580353-3e254f1d-7bf3-4f94-8817-a6eb0accedc0
  • msft-kb4580353-44fd2306-a708-4f52-ab50-b4cad9d98954
  • msft-kb4580353-59e7e42c-6434-4e0a-bd9f-b504d629f516
  • msft-kb4580358-12cf7c4b-339c-47dc-a087-73a7a0dedf6f
  • msft-kb4580358-ecb5ba66-abc4-450c-b228-5e6640687217
  • msft-kb4580358-ef30fd6b-8580-4ec5-9190-5cdb4b02f438
  • msft-kb4580385-47dabaa8-438f-49e7-9c31-2d481515c893
  • msft-kb4580385-9f71bd2c-88f2-4c58-b86f-dd0b9b03cfe7
  • msft-kb4580387-08d6fc97-597d-4b5b-8422-f4b57817b1c1
  • msft-kb4580387-1473a3e5-0aa3-43a1-b213-cf3151e2c15e
  • msft-kb4580387-5cef288f-a4e4-4cb7-86e0-ef3c89b43ced
  • msft-kb4580387-e92e01a4-761c-41f6-a9f6-5853bb7885c9
  • msft-kb4580387-fc890b9e-e1d1-43af-b7f8-d42201cd24aa

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;