9.3
CVE-2011-0027
- EPSS 67.61%
- Published 12.01.2011 01:00:01
- Last modified 11.04.2025 00:51:21
- Source secure@microsoft.com
- Teams watchlist Login
- Open Login
Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, does not properly validate memory allocation for internal data structures, which allows remote attackers to execute arbitrary code, possibly via a large CacheSize property that triggers an integer wrap and a buffer overflow, aka "ADO Record Memory Vulnerability." NOTE: this might be a duplicate of CVE-2010-1117 or CVE-2010-1118.
Data is provided by the National Vulnerability Database (NVD)
Microsoft ≫ Data Access Components Version2.8 Updatesp1
Microsoft ≫ Data Access Components Version2.8 Updatesp2
Microsoft ≫ Windows 2003 Server Updatesp2
Microsoft ≫ Windows Server 2003 Updatesp2
Microsoft ≫ Windows Xp Version- Updatesp2 Editionx64
Microsoft ≫ Windows Server 2003 Updatesp2
Microsoft ≫ Windows Xp Version- Updatesp2 Editionx64
Microsoft ≫ Windows Data Access Components Version6.0
Microsoft ≫ Windows 7 Version-
Microsoft ≫ Windows Server 2008 Editionitanium
Microsoft ≫ Windows Server 2008 Editionx32
Microsoft ≫ Windows Server 2008 Editionx64
Microsoft ≫ Windows Server 2008 Updatesp2 Editionx32
Microsoft ≫ Windows Server 2008 Updatesp2 Editionx64
Microsoft ≫ Windows Server 2008 Version- Updatesp2 Editionitanium
Microsoft ≫ Windows Server 2008 Versionr2 Editionitanium
Microsoft ≫ Windows Server 2008 Versionr2 Editionx64
Microsoft ≫ Windows Vista Updatesp1
Microsoft ≫ Windows Vista Updatesp2
Microsoft ≫ Windows Server 2008 Editionitanium
Microsoft ≫ Windows Server 2008 Editionx32
Microsoft ≫ Windows Server 2008 Editionx64
Microsoft ≫ Windows Server 2008 Updatesp2 Editionx32
Microsoft ≫ Windows Server 2008 Updatesp2 Editionx64
Microsoft ≫ Windows Server 2008 Version- Updatesp2 Editionitanium
Microsoft ≫ Windows Server 2008 Versionr2 Editionitanium
Microsoft ≫ Windows Server 2008 Versionr2 Editionx64
Microsoft ≫ Windows Vista Updatesp1
Microsoft ≫ Windows Vista Updatesp2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 67.61% | 0.985 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.3 | 8.6 | 10 |
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.