[Forgot Password]
Login  Register Subscribe

24003

 
 

131401

 
 

103942

 
 

909

 
 

84044

 
 

133

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2011-0026Date: (C)2011-01-11   (M)2018-03-12


Integer signedness error in the SQLConnectW function in an ODBC API (odbc32.dll) in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, allows remote attackers to execute arbitrary code via a long string in the Data Source Name (DSN) and a crafted szDSN argument, which bypasses a signed comparison and leads to a buffer overflow, aka "DSN Overflow Vulnerability."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : CVSS Score : 9.3
Exploit Score: Exploit Score: 8.6
Impact Score: Impact Score: 10.0
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: MEDIUM
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: COMPLETE
Scope: Integrity: COMPLETE
Confidentiality: Availability: COMPLETE
Integrity:  
Availability:  
  
Reference:
SECTRACK-1024947
SECUNIA-42804
BID-45695
OSVDB-70443
ADV-2011-0075
IAVM:2011-A-0004
MS11-002
TA11-011A
http://support.avaya.com/css/P8/documents/100124846
http://www.zerodayinitiative.com/advisories/ZDI-11-001/

CPE    3
cpe:/a:microsoft:windows_data_access_components:6.0
cpe:/a:microsoft:data_access_components:2.8:sp1
cpe:/a:microsoft:data_access_components:2.8:sp2
CWE    1
CWE-189
OVAL    3
oval:org.secpod.oval:def:7
oval:org.mitre.oval:def:12333
oval:org.secpod.oval:def:1048

© 2013 SecPod Technologies