Microsoft Access 'AccWizObjects' ActiveX Control Remote Code Execution Vulnerability

ID SMNTC-41444
Type symantec
Reporter Symantec Security Response
Modified 2010-07-13T00:00:00



Microsoft Access is prone to a remote code-execution vulnerability that affects the 'AccWizObjects' ActiveX control. An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Successful exploits will allow the attacker to execute arbitrary code within the context of the application, typically Internet Explorer, that uses the ActiveX control.

Technologies Affected

  • Microsoft Access 2003
  • Microsoft Access 2003 SP2
  • Microsoft Access 2003 SP3


Run all software as a nonprivileged user with minimal access rights.
To reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.

Do not follow links provided by unknown or untrusted sources.
Attackers could exploit this vulnerability by enticing a user to visit a malicious website. Do not follow links provided by sources of questionable integrity.

Set web browser security to disable the execution of script code or active content.
Disable support for script code and active content within a client browser to reduce the chances of a successful exploit. Note that this mitigation tactic might adversely affect legitimate websites that rely on the execution of browser-based script code.

Implement multiple redundant layers of security.
Since this issue may be leveraged to execute code, we recommend memory-protection schemes, such as nonexecutable stack/heap configurations and randomly mapped memory segments. This tactic may complicate exploits of memory-corruption vulnerabilities.

The vendor has released an advisory and fixes. Please see the references for more information.