A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated to process the string value. This allows an attacker to execute code of their choice on an affected host by copying carefully selected data that will be executed as code.
History

Mon, 06 Jan 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-01-06T17:34:46.483Z

Reserved: 2023-06-02T00:00:00

Link: CVE-2023-34364

cve-icon Vulnrichment

Updated: 2024-08-02T16:10:06.717Z

cve-icon NVD

Status : Modified

Published: 2023-06-09T07:15:10.563

Modified: 2025-01-06T18:15:15.910

Link: CVE-2023-34364

cve-icon Redhat

No data.