unixODBC before version 2.3.5 is vulnerable to a buffer overflow in the DriverManager/__info.c:unicode_to_ansi_copy() method. An attacker could exploit this to cause a denial of service or other unspecified impact. Upstream Release: https://sourceforge.net/projects/unixodbc/files/unixODBC/2.3.5/ Upstream Revision: https://sourceforge.net/p/unixodbc/code/136/#diff-12
Created unixODBC tracking bugs for this issue: Affects: fedora-all [bug 1548306]
When will you provide the fix for CVE-2018-7409 affected to package unixODBC Thanks and Regards, Vyshnav
Is unixODBC available on RHEL6.10 is vulnerable, as the patch is only available for 7.5
Analysis: This is essentially a buffer-overflow in the unicode_to_ansi_copy() function. However since the overflow is not directly controllable by the attacker, its maximum impact is crash or denial of service. This flaw has therefore been rated as having Moderate security impact.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2336 https://access.redhat.com/errata/RHSA-2019:2336
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-7409
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2020:4999 https://access.redhat.com/errata/RHSA-2020:4999