Vulnerability Name: | CVE-2014-3802 (CCN-93569) | ||||||||
Assigned: | 2014-05-14 | ||||||||
Published: | 2014-05-14 | ||||||||
Updated: | 2016-09-09 | ||||||||
Summary: | msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio before 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDB file. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-20 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2014-3802 Source: BID Type: Third Party Advisory, VDB Entry 67398 Source: CCN Type: BID-67398 Microsoft Debug Interface Access SDK 'msdia.dll' Memory Corruption Vulnerability Source: CCN Type: Microsoft Web site Debug Interface Access Source: MISC Type: Third Party Advisory, VDB Entry http://zerodayinitiative.com/advisories/ZDI-14-129/ Source: CCN Type: Red Hat Bugzilla Bug 1102323 CVE-2014-3468 libtasn1: asn1_get_bit_der() can return negative bit length Source: XF Type: UNKNOWN ms-debug-cve20143802-code-exec(93569) Source: CCN Type: ZDI-14-129 Microsoft DIA SDK msdia.dll Memory Corruption Vulnerability | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |