A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated to process the string value. This allows an attacker to execute code of their choice on an affected host by copying carefully selected data that will be executed as code.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://community.progress.com/s/article/Security-vulnerabilities-in-DataDirect-ODBC-Oracle-Wire-Protocol-driver-June-2023 - Vendor Advisory | |
References | () https://progress.com - Product |
21 Jun 2023, 01:55
Type | Values Removed | Values Added |
---|---|---|
First Time |
Progress datadirect Odbc Oracle Wire Protocol Driver
Progress |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-787 | |
References | (CONFIRM) https://community.progress.com/s/article/Security-vulnerabilities-in-DataDirect-ODBC-Oracle-Wire-Protocol-driver-June-2023 - Vendor Advisory | |
References | (MISC) https://progress.com - Product | |
CPE | cpe:2.3:a:progress:datadirect_odbc_oracle_wire_protocol_driver:*:*:*:*:*:*:*:* |
09 Jun 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-09 07:15
Updated : 2024-11-21 08:07
NVD link : CVE-2023-34364
Mitre link : CVE-2023-34364
CVE.ORG link : CVE-2023-34364
JSON object : View
Products Affected
progress
- datadirect_odbc_oracle_wire_protocol_driver
CWE
CWE-787
Out-of-bounds Write