MS.Windows.JET.CreateLvSMLocs.Code.Execution
Description
This indicates attack attempt to exploit a Remote Command Execution vulnerability in Microsoft Windows JET database engine.
A remote attacker could exploit this vulnerability by enticing a victim user to open a maliciously crafted JET database file. Successful exploitation would allow for arbitrary code execution with the privileges of the currently logged-in user.
Affected Products
Microsoft Windows 7
Microsoft Windows 8.1
Microsoft Windows 10
Microsoft Windows RT 8.1
Microsoft Windows Server 2008
Microsoft Windows Server 2012
Microsoft Windows Server 2016
Microsoft Windows Server version 1709 (Server Core Installation)
Microsoft Windows Server version 1803 (Server Core Installation)
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Refer to the vendor supplied advisory for updates:
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0577
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2022-05-05 | 20.310 | Sig Added |
2019-11-22 | 15.729 | Name:Microsoft. Windows. JET. CreateLvSMLocs. Code. Execution:MS. Windows. JET. CreateLvSMLocs. Code. Execution |
2019-03-12 | 14.571 | Default_action:pass:drop |
2019-02-20 | 14.557 | Sig Added |
2019-02-13 | 14.552 |