First published: Fri Oct 27 2006(Updated: )
The Execute method in the ADODB.Connection 2.7 and 2.8 ActiveX control objects (ADODB.Connection.2.7 and ADODB.Connection.2.8) in the Microsoft Data Access Components (MDAC) 2.5 SP3, 2.7 SP1, 2.8, and 2.8 SP1 does not properly track freed memory when the second argument is a BSTR, which allows remote attackers to cause a denial of service (Internet Explorer crash) and possibly execute arbitrary code via certain strings in the second and third arguments.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | =sp4 | |
Microsoft Data Access Components | =2.5-sp3 | |
Microsoft Windows XP | =sp2 | |
Microsoft Data Access Components | =2.8-sp1 | |
Microsoft Windows 2003 Server | ||
Microsoft Windows 2003 Server | =itanium | |
Microsoft Data Access Components | =2.8 | |
Microsoft Data Access Components | =2.7-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.