[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80198

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2011-0026

Date: (C)2011-01-11   (M)2018-01-19 


Integer signedness error in the SQLConnectW function in an ODBC API (odbc32.dll) in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, allows remote attackers to execute arbitrary code via a long string in the Data Source Name (DSN) and a crafted szDSN argument, which bypasses a signed comparison and leads to a buffer overflow, aka "DSN Overflow Vulnerability."

CVSS Score: 9.3Access Vector: NETWORK
Exploit Score: 8.6Access Complexity: MEDIUM
Impact Score: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE





Reference:
SECTRACK-1024947
SECUNIA-42804
BID-45695
OSVDB-70443
ADV-2011-0075
IAVM:2011-A-0004
MS11-002
TA11-011A
http://support.avaya.com/css/P8/documents/100124846
http://www.zerodayinitiative.com/advisories/ZDI-11-001/

CPE    3
cpe:/a:microsoft:windows_data_access_components:6.0
cpe:/a:microsoft:data_access_components:2.8:sp2
cpe:/a:microsoft:data_access_components:2.8:sp1
CWE    1
CWE-189
OVAL    3
oval:org.secpod.oval:def:1048
oval:org.mitre.oval:def:12333
oval:org.secpod.oval:def:7

© 2013 SecPod Technologies