First published: Fri Feb 28 2014(Updated: )
Buffer overflow in the client application in Base SAS 9.2 TS2M3, SAS 9.3 TS1M1 and TS1M2, and SAS 9.4 TS1M0 allows user-assisted remote attackers to execute arbitrary code via a crafted SAS program.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAS Software | =9.2-ts2m | |
SAS Software | =9.3-ts1m1 | |
SAS Software | =9.3-ts1m2 | |
SAS Software | =9.4-ts1m0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2262 is categorized with a CVSS score indicating a high severity due to its potential for remote code execution.
To mitigate CVE-2014-2262, you should upgrade to a patched version of SAS Base that addresses this buffer overflow vulnerability.
CVE-2014-2262 can enable user-assisted remote attackers to execute arbitrary code on affected systems.
CVE-2014-2262 affects SAS Base versions 9.2 TS2M3, 9.3 TS1M1, 9.3 TS1M2, and 9.4 TS1M0.
Yes, CVE-2014-2262 requires user interaction to execute the crafted SAS program that triggers the vulnerability.