[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

95906

 
 

909

 
 

77986

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2011-0027

Date: (C)2011-01-11   (M)2017-09-22
 
CVSS Score: 9.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, does not properly validate memory allocation for internal data structures, which allows remote attackers to execute arbitrary code, possibly via a large CacheSize property that triggers an integer wrap and a buffer overflow, aka "ADO Record Memory Vulnerability." NOTE: this might be a duplicate of CVE-2010-1117 or CVE-2010-1118.

Reference:
SECTRACK-1024947
SECUNIA-42804
BID-45698
OSVDB-70444
ADV-2011-0075
IAVM:2011-A-0004
MS11-002
TA11-011A
http://support.avaya.com/css/P8/documents/100124846
http://vreugdenhilresearch.nl/ms11-002-pwn2own-heap-overflow/
http://www.zerodayinitiative.com/advisories/ZDI-11-002/

CPE    3
cpe:/a:microsoft:windows_data_access_components:6.0
cpe:/a:microsoft:data_access_components:2.8:sp2
cpe:/a:microsoft:data_access_components:2.8:sp1
CWE    1
CWE-20
OVAL    3
oval:org.secpod.oval:def:8
oval:org.secpod.oval:def:1048
oval:org.mitre.oval:def:12411

© 2013 SecPod Technologies