Vulnerability Details : CVE-2007-3338
Multiple stack-based buffer overflows in Ingres database server 2006 9.0.4, r3, 2.6, and 2.5, as used in multiple CA (Computer Associates) products, allow remote attackers to execute arbitrary code via the (1) uuid_from_char or (2) duve_get_args functions.
Vulnerability category: OverflowExecute code
Products affected by CVE-2007-3338
- cpe:2.3:a:ingres:database_server:9.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:ingres:database_server:r3:*:*:*:*:*:*:*
- cpe:2.3:a:ingres:database_server:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:ingres:database_server:2.6:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-3338
19.96%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-3338
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2007-3338
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-3338
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/34998
-
http://www.securityfocus.com/bid/24585
-
http://www.securityfocus.com/archive/1/472194/100/0/threaded
-
http://www.securityfocus.com/archive/1/472197/100/0/threaded
-
http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-ingres-stack-overflow/
-
http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=145778
-
http://www.vupen.com/english/advisories/2007/2290
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/34995
-
http://www.vupen.com/english/advisories/2007/2288
Vendor Advisory
-
http://www.ngssoftware.com/advisories/medium-risk-vulnerability-in-ingres-stack-overflow/
-
http://supportconnectw.ca.com/public/ca_common_docs/ingresvuln_letter.asp
Patch
Jump to