First published: Mon Jul 31 2017(Updated: )
Heap-based buffer overflow in Actian Pervasive PSQL v12.10 and Zen v13 allows remote attackers to execute arbitrary code via crafted traffic to TCP port 1583. The overflow occurs after Server-Client encryption-key exchange. The issue results from an integer underflow that leads to a zero-byte allocation. The _srvLnaConnectMP1 function is affected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Actian PSQL | =12.10 | |
Actian Zen | =13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11757 has a critical severity rating due to its potential for allowing remote code execution.
To fix CVE-2017-11757, upgrade to versions of Actian Pervasive PSQL and Zen that are patched against this vulnerability.
CVE-2017-11757 affects Actian Pervasive PSQL v12.10 and Actian Zen v13.0.
Yes, CVE-2017-11757 can be exploited remotely through crafted traffic sent to TCP port 1583.
CVE-2017-11757 facilitates a heap-based buffer overflow attack, allowing attackers to execute arbitrary code.