Buffer Overflow Vulnerability in Progress DataDirect Connect for ODBC
CVE-2023-34364
9.8CRITICAL
Summary
A vulnerability has been identified in Progress DataDirect Connect for ODBC that enables a buffer overflow through an excessively large value provided in certain connection string options. This flaw may allow attackers to exploit the buffer overrun to execute arbitrary code on the affected system. Proper validation and accommodation for connection string data sizes are necessary to mitigate risks associated with unauthorized code execution.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved