On Tue, May 29, 2012 at 06:40:35PM +0300, Henri Salo wrote:
> Package: unixodbc
> Version: 2.2.14p2-1
> Severity: important
> Tags: security

> From Felipe Pena in [oss-security] CVE id request: Multiple buffer overflow 
> in unixODBC:
> """
> Multiple buffer overflow in unixODBC
> ===========================

> The library unixODBC doesn't check properly the input from FILEDSN=,
> DRIVER= options in the DSN,
> which causes buffer overflow when passed to the SQLDriverConnect() function.

> The unixODBC maintainer has been notified about the issue.

> Version affected
> ============

> FILEDSN= as of 2.0.10
> DRIVER= as of 2.3.1

What makes this a security bug?  What is the attack vector for tricking a
user into running an ODBC-enabled application with untrusted data in the
FILEDSN or DRIVER variables?

-- 
Steve Langasek                   Give me a lever long enough and a Free OS
Debian Developer                   to set it on, and I can move the world.
Ubuntu Developer                                    http://www.debian.org/
slanga...@ubuntu.com                                     vor...@debian.org



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to