CVE-2003-0353
Published Aug 27, 2003
Last updated 6 years ago
Overview
- Description
- Buffer overflow in a component of SQL-DMO for Microsoft Data Access Components (MDAC) 2.5 through 2.7 allows remote attackers to execute arbitrary code via a long response to a broadcast request to UDP port 1434.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:data_access_components:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B1985AB-FCAB-4ABC-BF03-9E11CD015596" }, { "criteria": "cpe:2.3:a:microsoft:data_access_components:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D331DB4-AA55-4E1B-8B73-14EE2F13E09E" }, { "criteria": "cpe:2.3:a:microsoft:data_access_components:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3BFD086-7F94-4482-AC27-E4FAD418B767" }, { "criteria": "cpe:2.3:a:microsoft:data_access_components:2.1.1.3711.11:ga:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ADD39E09-B345-4796-9C67-B2087F806988" }, { "criteria": "cpe:2.3:a:microsoft:data_access_components:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49A5B686-0B8A-4904-8166-24D899D24ED5" }, { "criteria": "cpe:2.3:a:microsoft:data_access_components:2.5:gold:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "092A2E97-C8C4-4F4F-9EC1-70E64DF0052D" }, { "criteria": "cpe:2.3:a:microsoft:data_access_components:2.5:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "950834D8-A6CE-4636-9ABC-47528001983D" }, { "criteria": "cpe:2.3:a:microsoft:data_access_components:2.5:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D819A49-C10C-47C8-8A82-6CAE4FD5396D" }, { "criteria": "cpe:2.3:a:microsoft:data_access_components:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01EAE3CC-D507-40A4-9198-873EE0E3DCE2" }, { "criteria": "cpe:2.3:a:microsoft:data_access_components:2.6:gold:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE28EB73-C986-4184-9C82-AC55432B3BA9" }, { "criteria": "cpe:2.3:a:microsoft:data_access_components:2.6:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BA9FEED-B40F-4673-B9D0-265B4BDC6411" }, { "criteria": "cpe:2.3:a:microsoft:data_access_components:2.6:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B11B6C6-D76E-4B6D-9792-89DE5569EA8D" }, { "criteria": "cpe:2.3:a:microsoft:data_access_components:2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "307B13E2-EB93-420B-B47E-0681864DC429" }, { "criteria": "cpe:2.3:a:microsoft:data_access_components:2.7:gold:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FC21845-6911-4FA4-9B9A-19F533ED3E1A" }, { "criteria": "cpe:2.3:a:microsoft:data_access_components:2.12.4202.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D627CFF6-F877-48CB-8C86-F8EF961C08C0" } ], "operator": "OR" } ] } ]