Integer signedness error in the SQLConnectW function in an ODBC API (odbc32.dll) in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, allows remote attackers to execute arbitrary code via a long string in the Data Source Name (DSN) and a crafted szDSN argument, which bypasses a signed comparison and leads to a buffer overflow, aka "DSN Overflow Vulnerability."
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: microsoft
Published: 2011-01-12T00:00:00
Updated: 2024-08-06T21:43:14.678Z
Reserved: 2010-12-10T00:00:00
Link: CVE-2011-0026
Vulnrichment
No data.
NVD
Status : Modified
Published: 2011-01-12T01:00:01.807
Modified: 2024-11-21T01:23:08.960
Link: CVE-2011-0026
Redhat
No data.