Microsoft Security Bulletin MS04-003
Buffer Overrun in MDAC Function Could Allow Code Execution (832483)
Issued: January 13, 2004
Updated: April 1, 2004
Who should read this document:
Customers who are using Microsoft® Windows®
Impact of vulnerability:
Remote code execution
Maximum Severity Rating:
Customers should install this security update at their earliest opportunity.
Security Update Replacement:
This update replaces the one that is provided in Microsoft Security Bulletin MS03-033.
After installing this update, user who have encrypted their temporary files may receive an error message. This error message is documented and resolution details can be found in Microsoft Knowledge Base Article 836683.
Tested Software and Security Update Download Locations:
- Microsoft Data Access Components 2.5 (included with Microsoft Windows 2000)
- Microsoft Data Access Components 2.6 (included with Microsoft SQL Server 2000)
- Microsoft Data Access Components 2.7 (included with Microsoft Windows XP)
- Microsoft Data Access Components 2.8 (included with Microsoft Windows Server 2003)
Note The same update applies to all these versions of MDAC - Download the Update
- Microsoft Data Access Components 2.8 (included with Windows Server 2003 64-Bit Edition) - Download the Update
The software listed above has been tested to determine if the versions are affected. Other versions either no longer include security patch support or may not be affected. Please review the Microsoft Support Lifecycle Web site to determine the support lifecycle for your product and version.
Obtaining other security updates:
Updates for other security issues are available from the following locations:
- Security updates are available from the Microsoft Download Center, and can be most easily found by doing a keyword search for "security_patch".
- Updates for consumer platforms are available from the WindowsUpdate Web site.
- Technical support is available from Microsoft Product Support Services at 1-866-PCSAFETY for customers in the U.S. and Canada. There is no charge for support calls that are associated with security updates.
- International customers can get support from their local Microsoft subsidiaries. There is no charge for support associated with security updates. Information on how to contact Microsoft support is available at the International Support Web Site.
- The Microsoft TechNet Security Web Site provides additional information about security in Microsoft products.
- Microsoft Software Update Services
- Microsoft Baseline Security Analyzer (MBSA): Please view Knowledge Base Article 306460 for list of security updates that have detection limitations with the MBSA tool.
- Windows Update
- Windows Update Catalog: Please view Knowledge Base Article 323166 for more information on the Windows Update Catalog.
- Office Update
Software Update Services (SUS):
Microsoft Software Update Services (SUS) enables administrators to quickly and reliably deploy the latest critical updates and security updates to Windows® 2000 and Windows Server™ 2003-based servers, as well as to desktop computers running Windows 2000 Professional or Windows XP Professional.
For information about how to deploy this security update with Software Update Services, visit the Software Update Services Web site.
Systems Management Server (SMS):
Systems Management Server can provide assistance deploying this security update. For information about Systems Management Server visit the SMS Web Site.
The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
- V1.0 January 13, 2004: Bulletin published
- V1.1 January 30, 2004: Updated the IPSEC policy in the Workarounds section, updated the command line install string under the Deployment Information section.
- V1.2 April 1, 2004: Updated caveats section with advice for customers who have encrypted their temporary files.