Buffer overflows in protegrity.dll of Protegrity Secure.Data Extension Feature (SEF) before 2.2.3.9 allow attackers with SQL access to execute arbitrary code via the extended stored procedures (1) xp_pty_checkusers, (2) xp_pty_insert, or (3) xp_pty_select.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=104758650516677&w=2 | |
http://secunia.com/advisories/8294 | |
http://www.kb.cert.org/vuls/id/247545 | Patch Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/7083 | Vendor Advisory |
http://www.securityfocus.com/bid/7084 | Vendor Advisory |
http://www.securityfocus.com/bid/7085 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2003-03-18 05:00
Updated : 2024-02-04 16:31
NVD link : CVE-2003-0030
Mitre link : CVE-2003-0030
CVE.ORG link : CVE-2003-0030
JSON object : View
Products Affected
protegrity
- secure.data
CWE