First published: Tue May 20 2014(Updated: )
msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio before 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDB file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Debug Interface Access Software Development Kit | ||
Microsoft Visual Studio | <=2012 | |
Microsoft Visual Studio | =2002 | |
Microsoft Visual Studio | =2003 | |
Microsoft Visual Studio | =2005 | |
Microsoft Visual Studio | =2010 | |
Microsoft Visual Studio | =2010-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3802 has a critical severity level as it allows remote attackers to execute arbitrary code.
To mitigate CVE-2014-3802, users should upgrade to a version of Microsoft Visual Studio released after 2012, which includes the appropriate security patches.
CVE-2014-3802 affects Microsoft Visual Studio versions 2002, 2003, 2005, and 2010, as well as the Microsoft Debug Interface Access Software Development Kit.
CVE-2014-3802 allows attackers to execute arbitrary code or cause a denial of service attack.
There are no documented workarounds for CVE-2014-3802, and updating the software is the most effective solution.