First published: Fri Jun 09 2023(Updated: )
A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated to process the string value. This allows an attacker to execute code of their choice on an affected host by copying carefully selected data that will be executed as code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Progress Datadirect Odbc Oracle Wire Protocol Driver | <08.02.2770 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-34364.
The severity of CVE-2023-34364 is critical with a severity value of 9.8.
The affected software is Progress DataDirect Connect for ODBC before version 08.02.2770 for Oracle.
An attacker can exploit CVE-2023-34364 by providing an overly large value for certain options of a connection string, which may overrun the buffer and allow the execution of arbitrary code.
Yes, you can find more information about CVE-2023-34364 at the following references: [Link 1](https://community.progress.com/s/article/Security-vulnerabilities-in-DataDirect-ODBC-Oracle-Wire-Protocol-driver-June-2023) and [Link 2](https://progress.com).