← Back to CVEs
CVE-2007-2417
N/ADescription
Heap-based buffer overflow in _mprosrv.exe in Progress Software Progress 9.1E and OpenEdge 10.1x, as used by the RSA Authentication Manager 6.0 and 6.1, SecurID Appliance 2.0, ACE/Server 5.2, and possibly other products, allows remote attackers to execute arbitrary code via crafted packets. NOTE: this issue might overlap CVE-2007-3491.
CVE Details
CVSS v3.1 ScoreN/A
Published7/15/2007
Last Modified4/23/2026
Sourcenvd
Honeypot Sightings0
Affected Products
progress:openedgeprogress:progressrsa:ace_serverrsa:securid
References
http://dvlabs.tippingpoint.com/advisory/TPTI-07-12(cve@mitre.org)
http://osvdb.org/37934(cve@mitre.org)
http://secunia.com/advisories/26058(cve@mitre.org)
http://secunia.com/advisories/26067(cve@mitre.org)
http://www.securityfocus.com/archive/1/473623/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/bid/24675(cve@mitre.org)
http://www.securitytracker.com/id?1018389(cve@mitre.org)
http://www.vupen.com/english/advisories/2007/2530(cve@mitre.org)
http://www.vupen.com/english/advisories/2007/2531(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35385(cve@mitre.org)
http://dvlabs.tippingpoint.com/advisory/TPTI-07-12(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/37934(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26058(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26067(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/473623/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/24675(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1018389(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/2530(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/2531(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35385(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.