Attackers Targeting Zero-Day Access Flaw
Merely opening a rigged Microsoft Office Access database file is enough to trigger a system takeover.Attackers are going after Microsoft Office Access databases, US-CERT warned earlier in the week, taking advantage of an unpatched stack buffer overflow to deliver malicious databases that are leading to system hijacking in an undetermined number of cases. Security researchers didn't have many details on the attacks, but US-CERT's advisory did say that users don't have to do anything beyond open a rigged Access database in order for a successful exploit to be sprung on them. The malicious files are of file type .MDB.
McAfee's Avert Labs said in a Dec. 12 posting that attacks could come via a number of vectors: via the Web, e-mail or instant messaging, "coupled with well-establishing social engineering techniques" to trick victims into launching an attachment that's been booby trapped.
- Avoid opening attachments from people they don't know or trust or that they haven't solicited.
- Block high-risk file attachments at e-mail gateways.