First published: Tue May 20 2014(Updated: )
msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio before 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDB file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Debug Interface Access Software Development Kit | ||
Microsoft Visual Studio | <=2012 | |
Microsoft Visual Studio | =2002 | |
Microsoft Visual Studio | =2003 | |
Microsoft Visual Studio | =2005 | |
Microsoft Visual Studio | =2010 | |
Microsoft Visual Studio | =2010-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.