First published: Fri Jun 22 2007(Updated: )
Multiple stack-based buffer overflows in Ingres database server 2006 9.0.4, r3, 2.6, and 2.5, as used in multiple CA (Computer Associates) products, allow remote attackers to execute arbitrary code via the (1) uuid_from_char or (2) duve_get_args functions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Actian Ingres | =2.5 | |
Actian Ingres | =2.6 | |
Actian Ingres | =9.0.4 | |
Actian Ingres | =r3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3338 is considered a high-severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2007-3338, it is essential to upgrade to the latest version of the Ingres database server that contains security patches.
CVE-2007-3338 affects Ingres database server versions 2.5, 2.6, r3, and 9.0.4.
Yes, CVE-2007-3338 allows remote attackers to exploit the vulnerability without needing local access.
CVE-2007-3338 is specifically related to buffer overflows in the uuid_from_char and duve_get_args functions.