CVE-2023-34364

A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated to process the string value. This allows an attacker to execute code of their choice on an affected host by copying carefully selected data that will be executed as code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:progress:datadirect_odbc_oracle_wire_protocol_driver:*:*:*:*:*:*:*:*

History

21 Jun 2023, 01:55

Type Values Removed Values Added
CWE CWE-787
First Time Progress datadirect Odbc Oracle Wire Protocol Driver
Progress
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References (MISC) https://progress.com - (MISC) https://progress.com - Product
References (CONFIRM) https://community.progress.com/s/article/Security-vulnerabilities-in-DataDirect-ODBC-Oracle-Wire-Protocol-driver-June-2023 - (CONFIRM) https://community.progress.com/s/article/Security-vulnerabilities-in-DataDirect-ODBC-Oracle-Wire-Protocol-driver-June-2023 - Vendor Advisory
CPE cpe:2.3:a:progress:datadirect_odbc_oracle_wire_protocol_driver:*:*:*:*:*:*:*:*

09 Jun 2023, 13:03

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-09 07:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-34364

Mitre link : CVE-2023-34364

CVE.ORG link : CVE-2023-34364


JSON object : View

Products Affected

progress

  • datadirect_odbc_oracle_wire_protocol_driver
CWE
CWE-787

Out-of-bounds Write