A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated to process the string value. This allows an attacker to execute code of their choice on an affected host by copying carefully selected data that will be executed as code.
References
Link | Resource |
---|---|
https://community.progress.com/s/article/Security-vulnerabilities-in-DataDirect-ODBC-Oracle-Wire-Protocol-driver-June-2023 | Vendor Advisory |
https://progress.com | Product |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-06-09T00:00:00
Updated: 2023-06-09T00:00:00
Reserved: 2023-06-02T00:00:00
Link: CVE-2023-34364
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-06-09T07:15:10.563
Modified: 2023-06-21T01:55:59.977
Link: CVE-2023-34364
JSON object: View
Redhat Information
No data.
CWE