CVE-2007-4278

Stack-based buffer overflow in the giomgr process in ESRI ArcSDE service 9.2, as used with ArcGIS, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number that requires more than 8 bytes to represent in ASCII, which triggers the overflow in an sprintf function call.
Configurations

Configuration 1 (hide)

cpe:2.3:a:esri:arcsde:9.2:-:*:*:*:*:*:*

History

21 Nov 2024, 00:35

Type Values Removed Values Added
References () http://downloads.esri.com/support/downloads/other_/ArcSDE-92sp3-issues.htm - Vendor Advisory () http://downloads.esri.com/support/downloads/other_/ArcSDE-92sp3-issues.htm - Vendor Advisory
References () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=577 - Broken Link () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=577 - Broken Link
References () http://secunia.com/advisories/26452 - Broken Link () http://secunia.com/advisories/26452 - Broken Link
References () http://securitytracker.com/id?1018574 - Broken Link, Third Party Advisory, VDB Entry () http://securitytracker.com/id?1018574 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/25334 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/25334 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2007/2911 - Broken Link, Third Party Advisory () http://www.vupen.com/english/advisories/2007/2911 - Broken Link, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/36042 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/36042 - Third Party Advisory, VDB Entry

11 Jul 2024, 18:05

Type Values Removed Values Added
First Time Esri arcsde
References () http://downloads.esri.com/support/downloads/other_/ArcSDE-92sp3-issues.htm - () http://downloads.esri.com/support/downloads/other_/ArcSDE-92sp3-issues.htm - Vendor Advisory
References () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=577 - () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=577 - Broken Link
References () http://secunia.com/advisories/26452 - Vendor Advisory () http://secunia.com/advisories/26452 - Broken Link
References () http://securitytracker.com/id?1018574 - () http://securitytracker.com/id?1018574 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/25334 - () http://www.securityfocus.com/bid/25334 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2007/2911 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/2911 - Broken Link, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/36042 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/36042 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:esri:arcgis:*:*:*:*:*:*:*:* cpe:2.3:a:esri:arcsde:9.2:-:*:*:*:*:*:*
CWE CWE-119 CWE-787

Information

Published : 2007-08-15 22:17

Updated : 2024-11-21 00:35


NVD link : CVE-2007-4278

Mitre link : CVE-2007-4278

CVE.ORG link : CVE-2007-4278


JSON object : View

Products Affected

esri

  • arcsde
CWE
CWE-787

Out-of-bounds Write