A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated to process the string value. This allows an attacker to execute code of their choice on an affected host by copying carefully selected data that will be executed as code.
References
Link | Resource |
---|---|
https://community.progress.com/s/article/Security-vulnerabilities-in-DataDirect-ODBC-Oracle-Wire-Protocol-driver-June-2023 | Vendor Advisory |
https://progress.com | Product |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-06-09 07:15
Updated : 2023-06-21 01:55
NVD link : CVE-2023-34364
Mitre link : CVE-2023-34364
CVE.ORG link : CVE-2023-34364
JSON object : View
Products Affected
progress
- datadirect_odbc_oracle_wire_protocol_driver
CWE
CWE-787
Out-of-bounds Write