Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-38444 | A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated to process the string value. This allows an attacker to execute code of their choice on an affected host by copying carefully selected data that will be executed as code. |
Mon, 06 Jan 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-06T17:34:46.483Z
Reserved: 2023-06-02T00:00:00.000Z
Link: CVE-2023-34364
Updated: 2024-08-02T16:10:06.717Z
Status : Modified
Published: 2023-06-09T07:15:10.563
Modified: 2025-01-06T18:15:15.910
Link: CVE-2023-34364
No data.
OpenCVE Enrichment
No data.
EUVD