First published: Thu Nov 14 2019(Updated: )
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Unixodbc Unixodbc | <=2.2.14 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
openSUSE openSUSE | =11.4 | |
openSUSE openSUSE | =11.3 | |
Redhat Enterprise Linux | =4.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =5.0 | |
debian/unixodbc | 2.3.6-0.1 2.3.11-2+deb12u1 2.3.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1145 is a vulnerability in the SQLDriverConnect() function in unixODBC that can lead to a buffer overflow condition.
CVE-2011-1145 has a severity value of 7, which is considered high.
CVE-2011-1145 affects unixODBC versions before 2.2.14p2 when specifying a large value for the SAVEFILE parameter in the connection string.
To fix CVE-2011-1145, you should update unixODBC to version 2.2.14p2 or later.
Yes, you can find more information about CVE-2011-1145 at the following references: [Bugzilla SUSE](https://bugzilla.suse.com/show_bug.cgi?id=CVE-2011-1145), [Bugzilla Red Hat](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1145), [Debian Security Tracker](https://security-tracker.debian.org/tracker/CVE-2011-1145).