MS11-002: Vulnerabilities in Microsoft Data Access Components Could Allow Remote Code Execution (2451910)

high Nessus Plugin ID 51455

Synopsis

Arbitrary code can be executed on the remote host through Microsoft Data Access Components.

Description

The version of Microsoft Data Access Components (MDAC) installed on the remote Windows host is affected by two vulnerabilities, which could allow arbitrary code execution if a user views a specially crafted web page:

- A buffer overflow in the Open Database Connectivity (ODBC) API used by third-party applications can be triggered by an overly long Data Source Name (DSN) argument. (CVE-2011-0026)

- A failure of MDAC to correctly allocate memory when handling internal data structures in ActiveX Data Objects (ADO) records can be abused to execute arbitrary code. (CVE-2011-0027)

Solution

Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, and 2008 R2.

See Also

https://www.nessus.org/u?eb0a7c03

https://www.zerodayinitiative.com/advisories/ZDI-11-001/

https://www.zerodayinitiative.com/advisories/ZDI-11-002/

Plugin Details

Severity: High

ID: 51455

File Name: smb_nt_ms11-002.nasl

Version: 1.27

Type: local

Agent: windows

Published: 1/11/2011

Updated: 8/5/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/11/2011

Vulnerability Publication Date: 1/11/2011

Reference Information

CVE: CVE-2011-0026, CVE-2011-0027

BID: 45695, 45698

IAVA: 2011-A-0004-S

MSFT: MS11-002

MSKB: 2419640