--%> SecPod SCAP Repo, a repository of SCAP Content (CVE, CCE, CPE, CWE, OVAL and XCCDF)
[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2011-0026

Date: (C)2011-01-11   (M)2017-09-22
 
CVSS Score: 9.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Integer signedness error in the SQLConnectW function in an ODBC API (odbc32.dll) in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, allows remote attackers to execute arbitrary code via a long string in the Data Source Name (DSN) and a crafted szDSN argument, which bypasses a signed comparison and leads to a buffer overflow, aka "DSN Overflow Vulnerability."

Reference:
SECTRACK-1024947
SECUNIA-42804
BID-45695
OSVDB-70443
ADV-2011-0075
IAVM:2011-A-0004
MS11-002
TA11-011A
http://support.avaya.com/css/P8/documents/100124846
http://www.zerodayinitiative.com/advisories/ZDI-11-001/

CPE    3
cpe:/a:microsoft:windows_data_access_components:6.0
cpe:/a:microsoft:data_access_components:2.8:sp2
cpe:/a:microsoft:data_access_components:2.8:sp1
CWE    1
CWE-189
OVAL    3
oval:org.secpod.oval:def:7
oval:org.secpod.oval:def:1048
oval:org.mitre.oval:def:12333

© 2013 SecPod Technologies