Openedge _mprosrv buffer overflow

2007.07.03
Credit: suresync
Risk: High
Local: Yes
Remote: No
CWE: CWE-119


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

There is a potential for a buffer overflow in the database executable _mprosrv while reading a TCP/IP message that is incorrectly formatted. To avoid this problem, additional checking has been added to the _mprosrv executable that will prevent incorrectly formatted messages from causing buffer overflows. Bug# OE00148128 has been addressed in Progress 9.1E0422 and OpenEdge 10.1B01. The 9.1E0422 version of this fix requires that 9.1E04 be installed prior to this fix being applied to the Progress installation. These versions of Progress are available for download from the OpenEdge Download Center.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top