Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

1/7/2020
02:00 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

The Discovery and Implications of 'MDB Leaker'

The "MDB Leaker" vulnerability in the Microsoft Access Database could lead to a memory leak if left unpatched.

Researchers today disclosed the details behind their discovery of CVE-2019-1463, a flaw inside the Microsoft Access database application that could lead to a memory leak if left unpatched.

The "MDB Leaker" vulnerability could potentially affect more than 85,000 companies, report the Mimecast researchers who discovered it. This represents the number of organizations using the Microsoft Access database management system. Most are located in the United States.

CVE-2019-1463 is strikingly similar to CVE-2019-0560, an information disclosure bug discovered by Mimecast in January 2019. The older flaw could enable unintended leakage of data in previously created Office documents and files. It's difficult to use as a code execution bug, experts say, but it could be leveraged to harvest information users unintentionally exposed.

The two vulnerabilities share a common coding error. In the case of MDB Leaker, an application's improper management of improper memory could also lead to the disclosure of sensitive or private data. Microsoft issued a patch for this bug in December 2019.

Its discovery started with a simple false positive, says Meni Farjon, chief scientist of advanced malware detection with Mimecast. The team used a static analysis engine, part of which was designed to detect the presence of machine code in data files that should only contain data objects. "Finding machine instructions, like CPU code, in a data file is bad news," Farjon says. While it could be harmless content fragments, there is always a possibility the machine code could indicate an exploit taking advantage of a reader like Microsoft Excel or Access, he adds.

This analysis system generated a false positive report for a Microsoft Access MDB file. Researchers found code fragments in the file, which should have been data-only, and worried it could be an exploit to give attackers control or accidental code that made its way into the file.

Further analysis revealed the machine code in that file was machine code the researchers found inside the Microsoft Access application itself. This led them to believe there was a possibility of an issue that caused content to leak from memory into the file, Farjon explains. This could have broader implications: if an attacker could access a machine with MDB files, or large quantities of MDB files, they could conduct an automated search to collect sensitive data within them.

"Essentially, when a document is saved, the contents of the memory in some locations are being dumped into a file on disk," he says. "In this scenario, other contents that were not expected to be dropped into the file were dropped into the file." The team saved the file and noticed its contents changed; the file presented different artifacts each time it was accessed.

Information disclosure and memory leak bugs are normally used in two-stage attacks, says Farjon of the implications for MDB Leaker. If an attacker has a remote code execution flaw, they still need to know where they are in memory in order to launch an attack. Vulnerabilities like CVE-2019-1463 can help them do this. "Without knowing the location, a remote code execution vulnerability is pretty much useless," he points out.

"Also, these access cells are leaking potentially sensitive information," Farjon continues. "But we can't say for sure what kind of information because it's completely random … this specific memory leak can leak anything from memory." In this sense, he says, an exploit is less likely because it's difficult for an attacker to gain access to specific pieces of information.

CVE-2019-1463 affects all versions of Microsoft Office. An advisory issued for the CVE ranked the vulnerability as Important. There is no knowledge of this bug being exploited in the wild.

When comparing MDB Leaker with similar bug CVE-2019-0560, Farjon says the latter is likely more significant because Microsoft Excel is more frequently used than Microsoft Access. That said, Access is used to store more sensitive content like database information, which usually contains usernames and passwords.

"The Excel one is a bit more dangerous because there are billions of those documents just out there that somebody could grab and use to hunt for sensitive information," he notes. "On the other hand, Microsoft Access is used to store much more personal, more sensitive information but is less commonly used."

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "What Tools Will Find Misconfigurations in My AWS S3 Cloud Buckets?"

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8423
PUBLISHED: 2020-04-02
A buffer overflow in the httpd daemon on TP-Link TL-WR841N V10 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the configuration of the Wi-Fi network.
CVE-2019-14868
PUBLISHED: 2020-04-02
In ksh version 20120801, a flaw was found in the way it evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those env...
CVE-2019-20635
PUBLISHED: 2020-04-02
codeBeamer before 9.5.0-RC3 does not properly restrict the ability to execute custom Java code and access the Java class loader via computed fields.
CVE-2020-11452
PUBLISHED: 2020-04-02
Microstrategy Web 10.4 includes functionality to allow users to import files or data from external resources such as URLs or databases. By providing an external URL under attacker control, it's possible to send requests to external resources (aka SSRF) or leak files from the local system using the f...
CVE-2020-11453
PUBLISHED: 2020-04-02
Microstrategy Web 10.4 is vulnerable to Server-Side Request Forgery in the Test Web Service functionality exposed through the path /MicroStrategyWS/. The functionality requires no authentication and, while it is not possible to pass parameters in the SSRF request, it is still possible to exploit it ...