{"id":96543,"date":"2019-08-28T08:06:19","date_gmt":"2019-08-28T15:06:19","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=96543"},"modified":"2025-05-27T20:19:22","modified_gmt":"2025-05-28T03:19:22","slug":"analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/","title":{"rendered":"Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423"},"content":{"rendered":"<h2>Introduction<\/h2>\n<p>As of July 2019, Microsoft has fixed around 43 bugs in the Jet Database Engine. McAfee has reported a couple of bugs and, so far, we have received 10 CVE\u2019s from <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/acknowledgments\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a>. In our previous <a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/\" target=\"_blank\" rel=\"noopener noreferrer\">post<\/a>, we discussed the root cause of CVE-2018-8423. While analyzing this CVE and patch from Microsoft, we found that there was a way to bypass it which resulted in another crash. We reported it to Microsoft and it fixed it in the January 19 patch Tuesday. This issue was assigned CVE-2019-0576. We recommend our users to install proper patches and follow proper patch management policy and keep their windows installations up to date.<\/p>\n<p>In this post we will do the root cause analysis of CVE-2019-0576. To exploit this vulnerability, an attacker needs to use social engineering techniques to convince a victim to open a JavaScript file which uses an ADODB connection object to access a malicious Jet Database file. Once the malicious Jet Database file is accessed, it calls the vulnerable function in msrd3x40.dll which can lead to exploitation of this vulnerability.<\/p>\n<h2>Background<\/h2>\n<p>As mentioned in our <a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/\" target=\"_blank\" rel=\"noopener noreferrer\">previous post<\/a>, CVE-2018-8423 can be triggered using a malicious Jet Database file and, as per the analysis, this issue was in the index number field. If the index number was too big the program would crash at the following location:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96545\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/2.png\" alt=\"\" width=\"740\" height=\"135\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/2.png 740w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/2-300x55.png 300w\" sizes=\"auto, (max-width: 740px) 100vw, 740px\" \/><\/p>\n<p>Here, ecx contains the malicious index number. On applying the Microsoft patch for CVE-2018-8423 we can see that, on opening this malicious file, we get the following error which denotes that the issue is fixed, and the crash does not occur anymore:<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/1.png\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2>Analyzing the Patch<\/h2>\n<p>We decided to dig deeper and see exactly how this issue was patched. On analyzing the \u201cmsrd3x40!TblPage::CreateIndexes\u201d function, we can see that there is a check to see if \u201cIndexNumber\u201d is greater than 0xFF, or 256, as can be seen below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96546\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/3.png\" alt=\"\" width=\"747\" height=\"266\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/3.png 747w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/3-300x107.png 300w\" sizes=\"auto, (max-width: 747px) 100vw, 747px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Here, the ecx which contains the index number has the malicious value of \u201c00002300\u201d and it is greater than 0xFF. If we see the code, there is a jump instruction. If we follow this jump instruction, we reach the following location:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96547\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/4.png\" alt=\"\" width=\"724\" height=\"251\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/4.png 724w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/4-300x104.png 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/p>\n<p>We can see that there is a call to the \u201cmsrd3x40!Err::SetError\u201d function, meaning the malicious file will not be parsed if the index value is greater than 0xFF and the program will give the error message \u201cUnrecognized database format\u201d and terminate.<\/p>\n<h2>Finding Another Issue with the Patch<\/h2>\n<p>By looking at the patch, it was obvious that program will terminate if the index value is greater than 0xFF, but we decided to try it with an index value \u201c00 00 00 20\u201d which is less than 0xFF, and we got another crash in the function \u201cmsrd3x40!Table::FindIndexFromName\u201d, as can be seen below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96548\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/5.png\" alt=\"\" width=\"773\" height=\"309\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/5.png 773w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/5-300x120.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/5-768x307.png 768w\" sizes=\"auto, (max-width: 773px) 100vw, 773px\" \/><\/p>\n<h2>Finding the Root Cause of the New Issue<\/h2>\n<p>As we know, if we give any index value which is less then 0xFF, we get a crash in the function \u201cmsrd3x40!Table::FindIndexFromName\u201d, so we decided to analyze it further to find out why that is happening.<\/p>\n<p>The crash is at the following location:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96549\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/6.png\" alt=\"\" width=\"834\" height=\"176\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/6.png 834w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/6-300x63.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/6-768x162.png 768w\" sizes=\"auto, (max-width: 834px) 100vw, 834px\" \/><\/p>\n<p>It seems that program is trying to access location \u201c[ebx+eax*4+574h]\u201d but it is not accessible, meaning it is an Out of Bound Read issue.<\/p>\n<p>This crash looks familiar as it was also seen in CVE-2018-8423, except that it was an Out of Bound Write, while this seems to be an Out of Bound Read. If we look at eax it contains \u201c0055b7a8\u201d which, when multiplied by 4, becomes a very large value.<\/p>\n<p>If we look at the file it looks like this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96550\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/7.png\" alt=\"\" width=\"672\" height=\"411\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/7.png 672w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/7-300x183.png 300w\" sizes=\"auto, (max-width: 672px) 100vw, 672px\" \/><\/p>\n<p>As can be seen in below image, if we parse this file, this value of \u201c00 00 00 20\u201d (in little endian from the above image), denotes the number of an index whose name is \u201cParentIDName\u201d:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96551\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/8.png\" alt=\"\" width=\"512\" height=\"555\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/8.png 512w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/8-277x300.png 277w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/8-461x500.png 461w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/p>\n<p>Looking at the debugger at the point of the crash, it seems that ebx+574h points to a memory location and eax contains an index value which is getting multiplied by 4. Now we need to figure out the following:<\/p>\n<ol>\n<li>What will be the value of eax that will cause the crash? We know that it should be less than 0xFF. But what would be the lowest value?<\/li>\n<li>What is the root cause of this issue?<\/li>\n<\/ol>\n<p>On setting a breakpoint on \u201cmsrd3x40!Table::FindIndexFromName\u201d and changing the index number to \u201c0000001f\u201d, (which does not cause a crash but helps with the debugging and understanding the program flow) we can see that edx contains the pointer to an index name which, in this case, is \u201cParentIdName\u201d:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96552\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/9.png\" alt=\"\" width=\"943\" height=\"648\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/9.png 943w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/9-300x206.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/9-768x528.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/9-728x500.png 728w\" sizes=\"auto, (max-width: 943px) 100vw, 943px\" \/><\/p>\n<p>Debugging further we can see that the eax value comes from [ebp] and the ebp value comes from [ebx+5F4h] as can be seen below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96553\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/10.png\" alt=\"\" width=\"719\" height=\"381\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/10.png 719w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/10-300x159.png 300w\" sizes=\"auto, (max-width: 719px) 100vw, 719px\" \/><\/p>\n<p>When we look at \u201cebx+5F4\u201d we can see the following:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96554\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/11.png\" alt=\"\" width=\"953\" height=\"228\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/11.png 953w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/11-300x72.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/11-768x184.png 768w\" sizes=\"auto, (max-width: 953px) 100vw, 953px\" \/><\/p>\n<p>We can see that \u201cebx+<span style=\"color: #ff0000;\"><strong>5F4<\/strong><\/span>\u201d contains the index number for all the indexes in the file. In our case the file has two indexes and their number are \u201c00 00 00 01\u201d and \u201c00 00 00 1f\u201d. If we carefully review the memory we can figure out that the maximum number of indices which can be stored here are 0x20, or 32:<\/p>\n<p>Start location: 00718d54<\/p>\n<p>Each index number is 4 bytes long. So 0x20*4 + 00718d54 = 00718DD4<\/p>\n<p>After this, if we look at ebx+<strong><span style=\"color: #ff0000;\">574+4<\/span>,<\/strong> we can see that it contains the pointer to index names:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96555\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/12.png\" alt=\"\" width=\"956\" height=\"615\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/12.png 956w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/12-300x193.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/12-768x494.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/12-777x500.png 777w\" sizes=\"auto, (max-width: 956px) 100vw, 956px\" \/><\/p>\n<p>So, the overall memory structure is like this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96556\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/13.png\" alt=\"\" width=\"714\" height=\"426\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/13.png 714w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/13-300x179.png 300w\" sizes=\"auto, (max-width: 714px) 100vw, 714px\" \/><\/p>\n<p>There are only 0x80 or 128 bytes available to save index name pointer at location EBX+574. Each pointer gets saved at an index number location, i.e. for index number 1 it will be saved at EBX+574+1*4, the location for index number 2 will be saved at EBX+574+2*4 and so on. (index number starts from 0).<\/p>\n<p>In this case, if we give an index number which is more than 31, the program will overwrite data past 0x80 bytes, which will be at the start of the EBX+5F4 location, which is the index number from the malicious file. So, in this case, if we give the value \u201c00 00 00 20\u201d instead of \u201c00 00 00 1f\u201d, it will overwrite the index number at the EBX+5F4 location, as can be seen below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96557\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/14.png\" alt=\"\" width=\"714\" height=\"461\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/14.png 714w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/14-300x194.png 300w\" sizes=\"auto, (max-width: 714px) 100vw, 714px\" \/><\/p>\n<p>Now the program tries to execute this instruction in \u201cmsrd3x40!Table::FindIndexFromName\u2019<\/p>\n<p>Mov ecx, dword ptr [ebx+eax*4+574h]<\/p>\n<p>Here, eax contains the index number which should be \u201c00 00 00 01\u201d but, since it is overwritten by \u201c0055b7a8\u201d which is a memory address, on multiplying it with 4, it becomes a huge number and then 574h is getting added to it. So, if that memory area does not exist and the program tries to read from that memory, we get an access violation error.<\/p>\n<p>So, to answer the questions we had:<\/p>\n<ol>\n<li>Any value which is less then 0xFF and greater then 0x31 will cause a crash if the resulting memory location from [ebx+eax*4+574h] is not accessible.<\/li>\n<li>The root cause is that an index number is getting overwritten by a memory location, causing invalid memory access in this case.<\/li>\n<\/ol>\n<h2>How is it Fixed by Microsoft in the Jan 19 Patch?<\/h2>\n<p>We again decided to analyze the patch to see how this issue was fixed. As is clear from the analysis, any value which is greater than or equal to 0x20 or 32 still causes a crash so, ideally, the patch should be checking this. Microsoft has added this check in the Jan 19 patch release, as can be seen below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96558\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/15.png\" alt=\"\" width=\"732\" height=\"612\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/15.png 732w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/15-300x251.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/15-598x500.png 598w\" sizes=\"auto, (max-width: 732px) 100vw, 732px\" \/><\/p>\n<p>As can be seen in the above image, eax hold the index value here and it is compared with 0x20. If it is more than or equal to 0x20 the program jumps to location 72fe1c00. If we go to that location, we can see the following:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96559\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/16.png\" alt=\"\" width=\"690\" height=\"448\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/16.png 690w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/16-300x195.png 300w\" sizes=\"auto, (max-width: 690px) 100vw, 690px\" \/><\/p>\n<p>As can be seen in the above image, it calls the destructor and then calls msrd3x40!Err::SetError function and returns. So, the program will display a message saying, \u201cUnrecognized database format\u201d and then terminate.<\/p>\n<h2>Conclusion<\/h2>\n<p>We reported this issue to Microsoft in October 2018 and it fixed this issue in the Jan 19 patch Tuesday. It was assigned CVE-2019-0576 to this issue. We recommend our users keep their Windows installations up to date and install vendor patches on a regular basis.<\/p>\n<h2>McAfee Coverage:<\/h2>\n<p>McAfee Network Security Platform customers are protected from this vulnerability by Signature IDs 0x45251700 \u2013 HTTP: Microsoft JET Database Engine Remote Code Execution Vulnerability (CVE-2018-8423) and 0x4525890 &#8211; HTTP: Microsoft JET Database Engine Remote Code Execution Vulnerability (CVE-2019-0576).<\/p>\n<p>McAfee AV detects the malicious file as BackDoor-DKI.dr .<\/p>\n<p>McAfee HIPS, Generic Buffer Overflow Protection (GBOP) feature will often cover this, depending on the process used to exploit the vulnerability.<\/p>\n<h2><strong>References<\/strong><\/h2>\n<ul>\n<li><a href=\"https:\/\/github.com\/brianb\/mdbtools\/blob\/master\/HACKING\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/brianb\/mdbtools\/blob\/master\/HACKING<\/a><\/li>\n<li><a href=\"http:\/\/jabakobob.net\/mdb\/table-page.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/jabakobob.net\/mdb\/table-page.html<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Introduction As of July 2019, Microsoft has fixed around 43 bugs in the Jet Database Engine. McAfee has reported a&#8230;<\/p>\n","protected":false},"author":612,"featured_media":96564,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[2095],"class_list":["post-96543","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423 | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Introduction As of July 2019, Microsoft has fixed around 43 bugs in the Jet Database Engine. McAfee has reported a couple of bugs and, so far, we have\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423 | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Introduction As of July 2019, Microsoft has fixed around 43 bugs in the Jet Database Engine. McAfee has reported a couple of bugs and, so far, we have\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-28T15:06:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T03:19:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"659\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hardik Shah\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hardik05\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hardik Shah\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/\"},\"author\":{\"name\":\"Hardik Shah\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/99cb905e9b4051dfea96a7752dea4342\"},\"headline\":\"Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423\",\"datePublished\":\"2019-08-28T15:06:19+00:00\",\"dateModified\":\"2025-05-28T03:19:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/\"},\"wordCount\":1439,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/\",\"name\":\"Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423 | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\",\"datePublished\":\"2019-08-28T15:06:19+00:00\",\"dateModified\":\"2025-05-28T03:19:22+00:00\",\"description\":\"Introduction As of July 2019, Microsoft has fixed around 43 bugs in the Jet Database Engine. McAfee has reported a couple of bugs and, so far, we have\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\",\"width\":659,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/99cb905e9b4051dfea96a7752dea4342\",\"name\":\"Hardik Shah\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b151596c8b1a8dc9b25ec3b19ccfd8c0\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2b87a13b8b83a589e5494d7db597ad6a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2b87a13b8b83a589e5494d7db597ad6a?s=96&d=mm&r=g\",\"caption\":\"Hardik Shah\"},\"description\":\"Hardik Shah, a Senior Research Engineer in McAfee Labs, is an experienced security researcher and technology evangelist. He has extensive experience with exploits, malware analysis, and various IPS engines. Shah enjoys figuring out ways to protect customers from the latest threats. Prior to McAfee, he worked with the IPS research team at Symantec. You can follow him on twitter at @hardik05\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/hardik05\/\",\"https:\/\/x.com\/hardik05\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/hardik-shah\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423 | McAfee Blog","description":"Introduction As of July 2019, Microsoft has fixed around 43 bugs in the Jet Database Engine. McAfee has reported a couple of bugs and, so far, we have","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423 | McAfee Blog","og_description":"Introduction As of July 2019, Microsoft has fixed around 43 bugs in the Jet Database Engine. McAfee has reported a couple of bugs and, so far, we have","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-08-28T15:06:19+00:00","article_modified_time":"2025-05-28T03:19:22+00:00","og_image":[{"width":659,"height":500,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","type":"image\/jpeg"}],"author":"Hardik Shah","twitter_card":"summary_large_image","twitter_creator":"@hardik05","twitter_site":"@McAfee","twitter_misc":{"Written by":"Hardik Shah","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/"},"author":{"name":"Hardik Shah","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/99cb905e9b4051dfea96a7752dea4342"},"headline":"Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423","datePublished":"2019-08-28T15:06:19+00:00","dateModified":"2025-05-28T03:19:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/"},"wordCount":1439,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/","name":"Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423 | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","datePublished":"2019-08-28T15:06:19+00:00","dateModified":"2025-05-28T03:19:22+00:00","description":"Introduction As of July 2019, Microsoft has fixed around 43 bugs in the Jet Database Engine. McAfee has reported a couple of bugs and, so far, we have","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","width":659,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-and-identifying-issues-with-the-microsoft-patch-for-cve-2018-8423\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/99cb905e9b4051dfea96a7752dea4342","name":"Hardik Shah","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b151596c8b1a8dc9b25ec3b19ccfd8c0","url":"https:\/\/secure.gravatar.com\/avatar\/2b87a13b8b83a589e5494d7db597ad6a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2b87a13b8b83a589e5494d7db597ad6a?s=96&d=mm&r=g","caption":"Hardik Shah"},"description":"Hardik Shah, a Senior Research Engineer in McAfee Labs, is an experienced security researcher and technology evangelist. He has extensive experience with exploits, malware analysis, and various IPS engines. Shah enjoys figuring out ways to protect customers from the latest threats. Prior to McAfee, he worked with the IPS research team at Symantec. You can follow him on twitter at @hardik05","sameAs":["https:\/\/www.linkedin.com\/in\/hardik05\/","https:\/\/x.com\/hardik05"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/hardik-shah\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/612"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=96543"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96543\/revisions"}],"predecessor-version":[{"id":214499,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96543\/revisions\/214499"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/96564"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=96543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=96543"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=96543"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=96543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}