Buffer Overflow Vulnerability in Microsoft Data Access Components
CVE-2011-0026

Currently unrated

Key Information:

Vendor
Microsoft
Vendor
CVE Published:
12 January 2011

Summary

The vulnerability arises from an integer signedness error in the SQLConnectW function of the ODBC API (odbc32.dll) utilized in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, as well as Windows Data Access Components (WDAC) 6.0. This flaw allows remote attackers to exploit a crafted Data Source Name (DSN) input, whereby an improperly handled argument can lead to a buffer overflow condition. Attackers can potentially execute arbitrary code on the affected systems, posing significant risks to users and organizations leveraging these components.

References

EPSS Score

60% chance of being exploited in the next 30 days.

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.