Unpatched.ai can make mistakes. Public reports may be added, updated, or removed at any time.
Report ID: 2024-247
An improper input validation issue exists in Microsoft Access, specifically MSACCESS.EXE version 16.0.18227.20162 when opening a specially crafted file. By sending a target the file and convincing them to open it, an attacker could unlikely gain Remote Code Execution (RCE) on the target's computer due to the unpatched issue. However, even if RCE isn't achieved, the crash could result in Denial of Service (DoS) for the target application. In addition, likely due to how Microsoft Access handles recent files, file recovery, and file repair, it is possible the issue could result in a persistent DoS attack, where the application will continue to crash, even after reboot by the target.
ExceptionAddress: 00007fffbcc4fd6d (mso20win32client!CrashWithRecovery+0x000000000000004d) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000NumberParameters: 2 Parameter[0]: 0000000000000001 Parameter[1]: 0000000000000000Attempt to write to address 0000000000000000
Child-SP RetAddr : Args to Child : Call Site0000002d`0daf7120 00007fff`bce71b66 : 000001a3`01483052 00000000`00000000 00000000`00000000 00000000`00000000 : mso20win32client!CrashWithRecovery+0x4d0000002d`0daf7180 00007ff8`726f1ee9 : 00000000`00000016 00000000`00000000 00000000`00000000 00000000`00000016 : mso20win32client!EnableAbortRedirectLiblet::Uninit+0x930000002d`0daf71f0 00007ff8`726d5011 : 000001a3`49b45f01 00000000`00000000 00000000`00000000 0000002d`0daf72a0 : ucrtbase!raise+0x1d90000002d`0daf7270 00007ff7`0c56e0ba : 00007fff`00000003 00000000`00000003 ffffffff`fffffffe 000001a3`29940ff0 : ucrtbase!abort+0x310000002d`0daf72a0 00007ff8`726f1f37 : 000001a3`49b45fc8 00000000`00000000 00000000`0c000002 00000000`0c000001 : msaccess!SetEnumIntlView+0x202a0000002d`0daf72d0 00007ff7`0c37771a : 000001a3`49b45fc8 00007fff`bd22c560 00000000`00000000 00000000`12000001 : ucrtbase!terminate+0x170000002d`0daf7300 00007ff7`0c378d9a : 00000000`00000000 00000000`00000000 00000000`00000000 0000002d`0daf73d0 : msaccess!JETESLoadProjectTypeLib+0x3f9a0000002d`0daf7350 00007ff7`0c377d34 : 000001a3`49b45f60 000001a3`1a583f90 00005a01`674e17a1 00007ff8`74ee7776 : msaccess!JETESLoadProjectTypeLib+0x561a0000002d`0daf73b0 00007ff7`0c3772c1 : 000001a3`49b43fe0 000001a3`49b43fe0 000001a3`3be66df0 00000000`00000000 : msaccess!JETESLoadProjectTypeLib+0x45b40000002d`0daf73e0 00007ff7`0c37a292 : 00000000`00000000 0000002d`0daf7950 0000002d`0daf7d98 000001a3`76980000 : msaccess!JETESLoadProjectTypeLib+0x3b410000002d`0daf7410 00007ff7`0c361668 : 00000000`00000000 00000000`00000001 00000000`00000001 00007ff7`0cdd35af : msaccess!JETESLoadProjectTypeLib+0x6b120000002d`0daf74c0 00007ff7`0cbc3c1b : 000001a3`26193d60 00007ff7`0cfa61b8 000001a3`3be66df0 00007ff7`0cbdf7dc : msaccess!ReleaseAccessIconResource+0x259e80000002d`0daf74f0 00007ff7`0cbdf668 : 0000002d`0daf7d98 00007ff7`0cfa61b8 000001a3`26193d60 00007ff7`0cbc29ee : msaccess!OpenHscrEmbedded+0x53d6b0000002d`0daf7520 00007ff7`0cbdf985 : 000001a3`3be66df0 00000000`00000000 000001a3`3be66df0 0000002d`0daf7950 : msaccess!OpenHscrEmbedded+0x6f7b80000002d`0daf7580 00007ff7`0c36148d : 00000000`00000000 000001a3`3be66df0 000001a3`3be66df0 00007ff8`7286b591 : msaccess!OpenHscrEmbedded+0x6fad50000002d`0daf75b0 00007ff7`0c35d949 : 000001a3`3417cf30 000001a3`4c17bfe8 00000000`00000000 00000000`00000411 : msaccess!ReleaseAccessIconResource+0x2580d0000002d`0daf7800 00007ff7`0cbd01f7 : 000001a3`00000001 00000000`00000000 00000000`00008004 00007ff7`0c41ced8 : msaccess!ReleaseAccessIconResource+0x21cc90000002d`0daf7870 00007ff7`0cc0e0c6 : 00000000`00000000 00000000`00008004 0000002d`0daf7ef9 000001a3`48dbb860 : msaccess!OpenHscrEmbedded+0x603470000002d`0daf78e0 00007ff7`0c7e5b76 : 0000002d`0daf7d98 00000000`00000000 0000002d`0daf7ef9 000001a3`48dbb860 : msaccess!OpenHscrEmbedded+0x9e2160000002d`0daf7d40 00007ff7`0c36ea60 : 000001a3`2e4b8ec0 0000002d`0daf7f00 00007ff8`727688c0 0000002d`0daf7f00 : msaccess!MSAU_GetSizeList+0x27260000002d`0daf7e90 00007ff7`0c36dea3 : 00000000`00000000 00000000`00000000 000001a3`2e4b8ec0 00000000`00000000 : msaccess!ReleaseAccessIconResource+0x32de00000002d`0daf7f60 00007ff7`0cbe95a5 : 000001a3`2e4b8f18 00000000`00000000 000001a3`2e4b8ec0 00000000`00000000 : msaccess!ReleaseAccessIconResource+0x322230000002d`0daf8260 00007ff7`0c3720f1 : 00000000`00000002 0000002d`0daf8790 00000000`00000002 00000000`00000000 : msaccess!OpenHscrEmbedded+0x796f50000002d`0daf8420 00007ff7`0c36348e : 0000002d`0daf85c0 0000002d`0daf86f8 000001a3`32bc1f70 0000002d`0daf86f8 : msaccess!ReleaseAccessIconResource+0x364710000002d`0daf8560 00007ff7`0c508775 : 0000002d`0daf8790 00000000`00000000 00000000`00000000 00000000`00000000 : msaccess!ReleaseAccessIconResource+0x2780e0000002d`0daf8680 00007ff7`0c504855 : 0000002d`0dafc360 00000000`00000000 00007ff8`74f9fbcc 0000002d`0dafdca0 : msaccess!MSAU_ErrSortStringArray+0x346050000002d`0dafc300 00007ff7`0c4fe5e7 : 00000000`00000105 00000000`00000000 00000000`00000000 00000000`00000000 : msaccess!MSAU_ErrSortStringArray+0x306e50000002d`0dafdbb0 00007ff7`0c50512a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : msaccess!MSAU_ErrSortStringArray+0x2a4770000002d`0daff290 00007ff7`0c7c2e8f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : msaccess!MSAU_ErrSortStringArray+0x30fba0000002d`0daff7b0 00007ff7`0c7c3fa5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : msaccess!GetAccessIntellisenseManager+0x5cdef0000002d`0daff950 00007ff7`0c333c72 : 00000000`0000000a 00000000`00000000 00000000`00000000 00000000`00000000 : msaccess!GetAccessIntellisenseManager+0x5df050000002d`0daffa30 00007ff8`72f7e8d7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : msaccess!Ordinal59+0x13c720000002d`0daffa70 00007ff8`74f9fbcc : 00000000`00000000 00000000`00000000 000004f0`fffffb30 000004d0`fffffb30 : KERNEL32!BaseThreadInitThunk+0x170000002d`0daffaa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x2c