Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2011-0026


Integer signedness error in the SQLConnectW function in an ODBC API (odbc32.dll) in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, allows remote attackers to execute arbitrary code via a long string in the Data Source Name (DSN) and a crafted szDSN argument, which bypasses a signed comparison and leads to a buffer overflow, aka "DSN Overflow Vulnerability."


Published

2011-01-12T01:00:01.807

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 9.3 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.6

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-189

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application microsoft data_access_components 2.8 Yes
Operating System microsoft windows_xp * No
Application microsoft data_access_components 2.8 Yes
Operating System microsoft windows_2003_server * No
Operating System microsoft windows_server_2003 * No
Operating System microsoft windows_xp - No
Application microsoft windows_data_access_components 6.0 Yes
Operating System microsoft windows_7 - No
Operating System microsoft windows_server_2008 * No
Operating System microsoft windows_server_2008 * No
Operating System microsoft windows_server_2008 * No
Operating System microsoft windows_server_2008 * No
Operating System microsoft windows_server_2008 * No
Operating System microsoft windows_server_2008 - No
Operating System microsoft windows_server_2008 r2 No
Operating System microsoft windows_server_2008 r2 No
Operating System microsoft windows_vista * No
Operating System microsoft windows_vista * No

References