CVE-2007-1770

Buffer overflow in the ArcSDE service (giomgr) in Environmental Systems Research Institute (ESRI) ArcGIS before 9.2 Service Pack 2, when using three tiered ArcSDE configurations, allows remote attackers to cause a denial of service (giomgr crash) and execute arbitrary code via long parameters in crafted requests.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:esri:arcsde:8.3:sp1:*:*:*:*:*:*
cpe:2.3:a:esri:arcsde:8.3:-:*:*:*:*:*:*
cpe:2.3:a:esri:arcsde:9.0:-:*:*:*:*:*:*
cpe:2.3:a:esri:arcsde:9.0:sp1:*:*:*:*:*:*
cpe:2.3:a:esri:arcsde:9.0:sp2:*:*:*:*:*:*
cpe:2.3:a:esri:arcsde:9.1:-:*:*:*:*:*:*
cpe:2.3:a:esri:arcsde:9.1:sp1:*:*:*:*:*:*
cpe:2.3:a:esri:arcsde:9.1:sp2:*:*:*:*:*:*

History

11 Jul 2024, 18:04

Type Values Removed Values Added
CWE NVD-CWE-Other CWE-120
First Time Esri arcsde
CPE cpe:2.3:a:esri:arcgis:*:*:sp1:*:*:*:*:* cpe:2.3:a:esri:arcsde:9.1:sp2:*:*:*:*:*:*
cpe:2.3:a:esri:arcsde:9.1:-:*:*:*:*:*:*
cpe:2.3:a:esri:arcsde:9.0:sp1:*:*:*:*:*:*
cpe:2.3:a:esri:arcsde:8.3:sp1:*:*:*:*:*:*
cpe:2.3:a:esri:arcsde:9.1:sp1:*:*:*:*:*:*
cpe:2.3:a:esri:arcsde:9.0:-:*:*:*:*:*:*
cpe:2.3:a:esri:arcsde:8.3:-:*:*:*:*:*:*
cpe:2.3:a:esri:arcsde:9.0:sp2:*:*:*:*:*:*
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/33282 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/33282 - Third Party Advisory, VDB Entry
References (CONFIRM) http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=19&MetaID=1261 - (CONFIRM) http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=19&MetaID=1261 - Vendor Advisory
References (CONFIRM) http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=19&MetaID=1260 - (CONFIRM) http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=19&MetaID=1260 - Vendor Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/33457 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/33457 - Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/24639 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/24639 - Broken Link
References (SECTRACK) http://www.securitytracker.com/id?1017874 - (SECTRACK) http://www.securitytracker.com/id?1017874 - Broken Link, Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/23175 - (BID) http://www.securityfocus.com/bid/23175 - Broken Link, Third Party Advisory, VDB Entry
References (VUPEN) http://www.vupen.com/english/advisories/2007/1140 - (VUPEN) http://www.vupen.com/english/advisories/2007/1140 - Broken Link, Third Party Advisory
References (CONFIRM) http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=19&MetaID=1262 - (CONFIRM) http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=19&MetaID=1262 - Vendor Advisory
References (IDEFENSE) http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=507 - (IDEFENSE) http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=507 - Broken Link

Information

Published : 2007-03-30 01:19

Updated : 2024-07-11 18:04


NVD link : CVE-2007-1770

Mitre link : CVE-2007-1770


JSON object : View

Products Affected

esri

  • arcsde
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')