Summary
The host is running Microsoft SQL Server, which is prone to buffer-overflow vulnerability.
Impact
Successful exploitation allows remote attackers to execute arbitrary code and failed attepts causes denial-of-service conditions.
Impact Level : Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
For updates refer http://www.microsoft.com/sqlserver
Insight
Applications sqlvdir.dll ActiveX control is prone to a buffer-overflow vulnerability because it fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. The issue occurs when excessive amounts of data to the Control() method is passed.
Affected
Microsoft SQL Server 2000 SP4 and prior on Windows (all)
References
Updated on 2017-03-28
Severity
Classification
-
CVE CVE-2008-4110 -
CVSS Base Score: 7.6
AV:N/AC:H/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Easy RM to MP3 Converter Buffer Overflow Vulnerability
- EMC Data Protection Advisor NULL Pointer Dereference Denial of Service Vulnerability
- Epson EventManager 'x-protocol-version' Denial of Service Vulnerability
- ClamAV 'find_stream_bounds()' PDF File Processing Denial Of Service Vulnerability
- 3com switch2hub