[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

111666

 
 

909

 
 

87321

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2011-0026Date: (C)2011-01-11   (M)2018-02-19


Integer signedness error in the SQLConnectW function in an ODBC API (odbc32.dll) in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, allows remote attackers to execute arbitrary code via a long string in the Data Source Name (DSN) and a crafted szDSN argument, which bypasses a signed comparison and leads to a buffer overflow, aka "DSN Overflow Vulnerability."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 9.3
Exploit Score: 8.6
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1024947
SECUNIA-42804
BID-45695
OSVDB-70443
ADV-2011-0075
IAVM:2011-A-0004
MS11-002
TA11-011A
http://support.avaya.com/css/P8/documents/100124846
http://www.zerodayinitiative.com/advisories/ZDI-11-001/

CPE    3
cpe:/a:microsoft:windows_data_access_components:6.0
cpe:/a:microsoft:data_access_components:2.8:sp1
cpe:/a:microsoft:data_access_components:2.8:sp2
CWE    1
CWE-189
OVAL    3
oval:org.secpod.oval:def:7
oval:org.secpod.oval:def:1048
oval:org.mitre.oval:def:12333

© SecPod Technologies