First published: Tue Apr 09 2024(Updated: )
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Visual Studio 2019 (includes 16.0 - 16.10) | =16.11 | |
Microsoft SQL Server | >=15.0.2000.5<15.0.2110.4 | |
Microsoft SQL Server | >=15.0.4003.23<15.0.4360.2 | |
Microsoft SQL Server | >=16.0.1000.6<16.0.1115.1 | |
Microsoft SQL Server | >=16.0.4003.1<16.0.4120.1 | |
Microsoft ODBC Driver 17 for SQL Server | >=17<17.10.6.1 | |
Microsoft ODBC Driver 17 for SQL Server | >=17<17.10.6.1 | |
Microsoft ODBC Driver 17 for SQL Server | >=17.0.1.1<17.10.6.1 | |
Microsoft ODBC Driver 17 for SQL Server | >=18.0<18.3.3.1 | |
Microsoft ODBC Driver 17 for SQL Server | >=18.0<18.3.3.1 | |
Microsoft ODBC Driver 17 for SQL Server | >=18.0.1.1<18.3.3.1 | |
Microsoft Visual Studio | >=16.0<16.11.35 | |
Microsoft Visual Studio | >=17.4.0<17.4.18 | |
Microsoft Visual Studio | >=17.6.0<17.6.14 | |
Microsoft Visual Studio | >=17.8.0<17.8.9 | |
Microsoft Visual Studio | >=17.9.0<17.9.6 | |
Microsoft Visual Studio | =17.4 | |
Microsoft Visual Studio | =17.8 | |
Microsoft ODBC Driver 17 for SQL Server | ||
Microsoft ODBC Driver 17 for SQL Server | ||
Microsoft ODBC Driver 18 for SQL Server | ||
Microsoft ODBC Driver 18 for SQL Server | ||
Microsoft ODBC Driver 18 for SQL Server | ||
Microsoft ODBC Driver 17 for SQL Server | ||
Microsoft SQL Server 2022 | ||
Microsoft SQL Server 2019 | ||
Microsoft SQL Server | ||
Microsoft SQL Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28929 has a critical severity rating due to its potential for remote code execution.
To resolve CVE-2024-28929, apply the latest security patch provided by Microsoft for affected software.
CVE-2024-28929 affects multiple Microsoft products including SQL Server 2019, SQL Server 2022, and various versions of the ODBC Driver for SQL Server.
CVE-2024-28929 is classified as a remote code execution vulnerability, which could allow an attacker to execute arbitrary code on the affected system.
There are no official workarounds available for CVE-2024-28929, and users are advised to apply patches as soon as they become available.