First published: Fri Jun 29 2007(Updated: )
Buffer overflow in _mprosrv in Progress Software OpenEdge before 9.1E0422, and 10.x before 10.1B01, allows remote attackers to have an unknown impact via a malformed TCP/IP message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Progress OpenEdge Explorer | =9.1e | |
Progress OpenEdge Explorer | =10.1a | |
Progress OpenEdge Explorer | =10.1b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3491 is classified with a high severity due to its potential for remote exploitation and impacts on system integrity.
To fix CVE-2007-3491, you should upgrade to the latest patched version of Progress OpenEdge, specifically version 9.1E0422 or 10.1B01 and later.
CVE-2007-3491 affects users of Progress OpenEdge versions 9.1E and 10.1A and B prior to the specified patched versions.
CVE-2007-3491 exploits a buffer overflow vulnerability in the _mprosrv component of Progress OpenEdge.
Yes, CVE-2007-3491 can be exploited remotely through a malformed TCP/IP message.