First published: Wed Aug 15 2007(Updated: )
Stack-based buffer overflow in the giomgr process in ESRI ArcSDE service 9.2, as used with ArcGIS, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number that requires more than 8 bytes to represent in ASCII, which triggers the overflow in an sprintf function call.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Esri ArcGIS | ||
ESRI ArcSDE | =9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4278 is considered a moderate severity vulnerability due to the potential for remote exploitation leading to denial of service and arbitrary code execution.
To mitigate CVE-2007-4278, users should upgrade to a patched version of ESRI ArcGIS or ESRI ArcSDE that addresses this buffer overflow issue.
CVE-2007-4278 affects ESRI ArcSDE version 9.2 and ESRI ArcGIS products utilizing the giomgr process.
CVE-2007-4278 is a stack-based buffer overflow vulnerability allowing for denial of service and possible remote code execution.
Yes, CVE-2007-4278 can potentially lead to remote code execution if exploited, making it critical to apply patches.