Unpatched.ai can make mistakes. Public reports may be added, updated, or removed at any time.
Report ID: 2024-272
A memory safety issue exists in Microsoft Access, specifically MSACCESS.EXE version 16.0.18227.20162 when opening a specially crafted file. By sending a target the file and convincing them to open it, an attacker could potentially gain Remote Code Execution (RCE) on the target's computer due to the unpatched issue.
ExceptionAddress: 00007ff84f5c03a7 (VCRUNTIME140!memcpy_avx_ermsb_Intel+0x0000000000000167) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 00000222ae927920Attempt to read from address 00000222ae927920
Child-SP RetAddr : Args to Child : Call Site000000a2`43dc3828 00007ff7`0c43d06c : 00000000`00000001 000000a2`43dc3910 00000000`fffff7e0 00000000`000000db : VCRUNTIME140!memcpy_avx_ermsb_Intel+0x167 [D:\a\_work\1\s\src\vctools\crt\vcruntime\src\string\amd64\Intel\memcpy_avx_ermsb_aligned.asm @ 231] 000000a2`43dc3830 00007ff8`72ed939c : 00000000`00000ffd 00007fff`b2bf6c30 00000222`ae92a098 00000000`11000000 : msaccess!JETESLoadProjectTypeLib+0xc98ec000000a2`43dc3a20 00007ff8`72ed89f4 : 00000222`a948ecb8 00000000`00000001 00000000`00000025 00007ff7`fffffffe : coml2!CPagedVector::GetTableWithSect+0x99c000000a2`43dc3ab0 00007ff8`72ed835c : 00000000`00000000 000000a2`43dc3d18 00000000`00000000 00007ff7`0c370ead : coml2!CPagedVector::GetTable+0x14000000a2`43dc3af0 00007ff8`72ed7d7a : 00000000`00000000 000000a2`43dc3c70 002e0034`00000000 00000000`00000000 : coml2!CFat::Contig+0x11c000000a2`43dc3b80 00007ff8`72ed7aa8 : 00007ff7`0cbe95a5 00007ff7`0c3720f1 00001b12`b54db4f1 00000000`0000008e : coml2!CStreamCache::GetSect+0x18a000000a2`43dc3e50 00007ff8`72ed77c0 : 00000222`fffffffe 00000000`00000000 00000000`00000083 00007fff`b9755065 : coml2!CStreamCache::Contig+0xb8000000a2`43dc3eb0 00007ff8`72eeb558 : 00000222`d8759538 00007fff`b4c79548 00007ff7`0d1a27a0 00000000`00000000 : coml2!CDirectStream::ReadAt+0x130000000a2`43dc4110 00007ff8`72edc47f : 000000a2`43dc4420 00000000`00000009 00000222`d172f170 00007fff`b2c01424 : coml2!CTransactedStream::ReadAt+0x88000000a2`43dc41c0 00007ff7`0c37af42 : 00000000`00012a44 00000222`a4e30e40 00000000`00000000 00000000`00000000 : coml2!CExposedStream::Read+0x1ef000000a2`43dc4270 00007ff7`0c379c37 : 00000222`00000000 000000a2`43dc76b0 00000000`00000bc0 00000000`01000003 : msaccess!JETESLoadProjectTypeLib+0x77c2000000a2`43dc42d0 00007ff7`0c8a022a : 00000222`a73d0088 00007ff8`728f5e8c 00000222`d172e5b0 00007ff7`0cac8b31 : msaccess!JETESLoadProjectTypeLib+0x64b7000000a2`43dc4450 00007ff7`0c8ba51e : 000000a2`00000042 000000a2`43dc76b0 00000000`00000000 00000000`00000001 : msaccess!AccessLoadString+0x2658a000000a2`43dc44a0 00007ff7`0c8a703f : 00007ff7`00000001 00007ff7`0ceb4950 00000000`00000000 00000000`00000200 : msaccess!AccessLoadString+0x4087e000000a2`43dc4510 00007ff7`0c89ef7c : 000000a2`43dc46b8 00000000`00000004 000000a2`43dc46b8 00000000`00000000 : msaccess!AccessLoadString+0x2d39f000000a2`43dc4670 00007ff7`0c8a6d2a : 00000000`0000000c 00000222`f1523f70 000000a2`43dc76b0 00000000`00000001 : msaccess!AccessLoadString+0x252dc000000a2`43dc5540 00007ff7`0c8a61a8 : 00000000`00000000 00000000`00000000 000000a2`43dc7ec0 00000000`00000001 : msaccess!AccessLoadString+0x2d08a000000a2`43dc5d00 00007ff7`0c89e772 : 00000000`00020102 00000222`c3920860 00000000`00008000 00000000`00000000 : msaccess!AccessLoadString+0x2c508000000a2`43dc7600 00007ff7`0c652af6 : 00000222`bc449f40 000000a2`43dc7a40 00001b12`b54df0c1 00000000`00000102 : msaccess!AccessLoadString+0x24ad2000000a2`43dc7a20 00007ff7`0c691e81 : 006f0073`006f0072 004a002e`00740066 004e002e`00740065 00760069`00740061 : msaccess!SizeCallback+0xdc006000000a2`43dc7c10 00007ff7`0c41ced8 : 00000222`c3920860 00007ff7`0cbc3b97 00000000`00000003 000000a2`00000000 : msaccess!WizChooseColor+0x3d971000000a2`43dc7c80 00007ff7`0cc0e369 : 00000000`00000000 00000000`00008000 000000a2`43dc82e9 00000222`c3920860 : msaccess!JETESLoadProjectTypeLib+0xa9758000000a2`43dc7cd0 00007ff7`0c7e5b45 : 000000a2`43dc8188 00000000`00000000 000000a2`43dc82e9 00000222`c3920860 : msaccess!OpenHscrEmbedded+0x9e4b9000000a2`43dc8130 00007ff7`0c36ea60 : 00000222`a34beec0 000000a2`43dc82f0 00007ff8`727688c0 000000a2`43dc82f0 : msaccess!MSAU_GetSizeList+0x26f5000000a2`43dc8280 00007ff7`0c36dea3 : 00000000`00000000 00000000`00000000 00000222`a34beec0 00000000`00000000 : msaccess!ReleaseAccessIconResource+0x32de0000000a2`43dc8350 00007ff7`0cbe95a5 : 00000222`a34bef18 00000000`00000000 00000222`a34beec0 00000000`00000000 : msaccess!ReleaseAccessIconResource+0x32223000000a2`43dc8650 00007ff7`0c3720f1 : 00000000`00000002 000000a2`43dc8b80 00000000`00000002 00000000`00000000 : msaccess!OpenHscrEmbedded+0x796f5000000a2`43dc8810 00007ff7`0c36348e : 000000a2`43dc89b0 000000a2`43dc8ae8 00000222`a8a48f70 000000a2`43dc8ae8 : msaccess!ReleaseAccessIconResource+0x36471000000a2`43dc8950 00007ff7`0c508775 : 000000a2`43dc8b80 00000000`00000000 00000000`00000000 00000000`00000000 : msaccess!ReleaseAccessIconResource+0x2780e000000a2`43dc8a70 00007ff7`0c504855 : 000000a2`43dcc750 00000000`00000000 00007ff8`74f9fbcc 000000a2`43dce090 : msaccess!MSAU_ErrSortStringArray+0x34605000000a2`43dcc6f0 00007ff7`0c4fe5e7 : 00000000`00000105 00000000`00000000 00000000`00000000 00000000`00000000 : msaccess!MSAU_ErrSortStringArray+0x306e5000000a2`43dcdfa0 00007ff7`0c50512a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : msaccess!MSAU_ErrSortStringArray+0x2a477000000a2`43dcf680 00007ff7`0c7c2e8f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : msaccess!MSAU_ErrSortStringArray+0x30fba000000a2`43dcfba0 00007ff7`0c7c3fa5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : msaccess!GetAccessIntellisenseManager+0x5cdef000000a2`43dcfd40 00007ff7`0c333c72 : 00000000`0000000a 00000000`00000000 00000000`00000000 00000000`00000000 : msaccess!GetAccessIntellisenseManager+0x5df05000000a2`43dcfe20 00007ff8`72f7e8d7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : msaccess!Ordinal59+0x13c72000000a2`43dcfe60 00007ff8`74f9fbcc : 00000000`00000000 00000000`00000000 000004f0`fffffb30 000004d0`fffffb30 : KERNEL32!BaseThreadInitThunk+0x17000000a2`43dcfe90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x2c