Buffer Overflow Vulnerability in Microsoft Data Access Components
CVE-2011-0026
Currently unrated
Summary
The vulnerability arises from an integer signedness error in the SQLConnectW function of the ODBC API (odbc32.dll) utilized in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, as well as Windows Data Access Components (WDAC) 6.0. This flaw allows remote attackers to exploit a crafted Data Source Name (DSN) input, whereby an improperly handled argument can lead to a buffer overflow condition. Attackers can potentially execute arbitrary code on the affected systems, posing significant risks to users and organizations leveraging these components.
References
EPSS Score
60% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved