MS.VB.DSR.File.Handling.Buffer.Overflow
Description
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Microsoft Visual Basic.
This issue is caused by an error in the vulnerable software when handling a malformed DSR file with an overlong "ConnectionName" or "CommandText" field. It may allow remote attackers to execute arbitrary code by sending a crafted DSR file.
Affected Products
Microsoft Visual Basic Enterprise Edition 6
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Currently we are not aware of any vendor supplied patch for this issue.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |