First published: Sun Jul 15 2007(Updated: )
Heap-based buffer overflow in _mprosrv.exe in Progress Software Progress 9.1E and OpenEdge 10.1x, as used by the RSA Authentication Manager 6.0 and 6.1, SecurID Appliance 2.0, ACE/Server 5.2, and possibly other products, allows remote attackers to execute arbitrary code via crafted packets. NOTE: this issue might overlap CVE-2007-3491.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RSA SecurID | =2.0 | |
Progress OpenEdge Explorer | =10.1a | |
Progress OpenEdge Explorer | =10.1b | |
Progress | =9.1e | |
RSA ACE Server | =5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2417 is classified as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2007-2417, upgrade to the latest versions of the affected products that address the buffer overflow issue.
CVE-2007-2417 affects Progress Software Progress 9.1E, OpenEdge 10.1A and 10.1B, RSA Authentication Manager 6.0 and 6.1, and RSA ACE/Server 5.2.
CVE-2007-2417 allows remote attackers to execute arbitrary code on vulnerable systems via crafted packets.
Yes, vendors have released patches for CVE-2007-2417 that should be applied immediately to affected systems.