Summary
The host is running Microsoft SQL Server, which is prone to buffer-overflow vulnerability.
Impact
Successful exploitation allows remote attackers to execute arbitrary code and failed attepts causes denial-of-service conditions.
Impact Level : Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
For updates refer http://www.microsoft.com/sqlserver
Insight
Applications sqlvdir.dll ActiveX control is prone to a buffer-overflow vulnerability because it fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. The issue occurs when excessive amounts of data to the Control() method is passed.
Affected
Microsoft SQL Server 2000 SP4 and prior on Windows (all)
References
Updated on 2017-03-28
Severity
Classification
-
CVE CVE-2008-4110 -
CVSS Base Score: 7.6
AV:N/AC:H/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Apple QuickTime Multiple Vulnerabilities - Jan09 (Win)
- CUPS IPP Use-After-Free Denial of Service Vulnerability
- Apple QuickTime Multiple Denial Of Service Vulnerabilities (Win)
- Adobe Flash Media Server Memory Corruption Remote Denial of Service Vulnerability
- Apple iTunes Local Privilege Escalation Vulnerability