CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
97.4%
Buffer overflow in a component of Microsoft Data Access Components (MDAC) 2.5 through 2.8 allows remote attackers to execute arbitrary code via a malformed UDP response to a broadcast request.
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | data_access_components | 2.5 | cpe:2.3:a:microsoft:data_access_components:2.5:*:*:*:*:*:*:* |
microsoft | data_access_components | 2.6 | cpe:2.3:a:microsoft:data_access_components:2.6:*:*:*:*:*:*:* |
microsoft | data_access_components | 2.7 | cpe:2.3:a:microsoft:data_access_components:2.7:*:*:*:*:*:*:* |
microsoft | data_access_components | 2.8 | cpe:2.3:a:microsoft:data_access_components:2.8:*:*:*:*:*:*:* |
www.kb.cert.org/vuls/id/139150
www.osvdb.org/3457
www.securityfocus.com/bid/9407
docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-003
exchange.xforce.ibmcloud.com/vulnerabilities/14187
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A525
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A553
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A751
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A775