[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2011-0026Date: (C)2011-01-11   (M)2023-12-22


Integer signedness error in the SQLConnectW function in an ODBC API (odbc32.dll) in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, allows remote attackers to execute arbitrary code via a long string in the Data Source Name (DSN) and a crafted szDSN argument, which bypasses a signed comparison and leads to a buffer overflow, aka "DSN Overflow Vulnerability."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 9.3
Exploit Score: 8.6
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1024947
SECUNIA-42804
BID-45695
OSVDB-70443
ADV-2011-0075
MS11-002
TA11-011A
http://support.avaya.com/css/P8/documents/100124846
http://www.zerodayinitiative.com/advisories/ZDI-11-001/
oval:org.mitre.oval:def:12333

CWE    1
CWE-189
OVAL    3
oval:org.secpod.oval:def:7
oval:org.secpod.oval:def:1048
oval:org.mitre.oval:def:12333

© SecPod Technologies