HIGH · 9.3

CVE-2011-0026

Integer signedness error in the SQLConnectW function in an ODBC API (odbc32.dll) in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, allows remot...

Vulnerability Description

Integer signedness error in the SQLConnectW function in an ODBC API (odbc32.dll) in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, allows remote attackers to execute arbitrary code via a long string in the Data Source Name (DSN) and a crafted szDSN argument, which bypasses a signed comparison and leads to a buffer overflow, aka "DSN Overflow Vulnerability."

CVSS Score

9.3

HIGH

AV:N/AC:M/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
MicrosoftData Access Components2.8
MicrosoftWindows XpAll versions
MicrosoftWindows 2003 ServerAll versions
MicrosoftWindows Server 2003All versions
MicrosoftWindows Data Access Components6.0
MicrosoftWindows 7-
MicrosoftWindows Server 2008All versions
MicrosoftWindows VistaAll versions

Related Weaknesses (CWE)

References

FAQ

What is CVE-2011-0026?

CVE-2011-0026 is a vulnerability with a CVSS score of 9.3 (HIGH). Integer signedness error in the SQLConnectW function in an ODBC API (odbc32.dll) in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, allows remot...

How severe is CVE-2011-0026?

CVE-2011-0026 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2011-0026?

Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Data Access Components, Microsoft Windows Xp, Microsoft Windows 2003 Server, Microsoft Windows Server 2003, Microsoft Windows Data Access Components.