Security Advisories (4)
CVE-2020-14393 (2020-09-16)

A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.

CVE-2020-14392 (2020-06-17)

An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.

CVE-2019-20919 (2020-09-17)

An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.

CVE-2014-10402 (2020-09-16)

An issue was discovered in the DBI module through 1.643 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute in the data source name (DSN). NOTE: this issue exists because of an incomplete fix for CVE-2014-10401.

NAME

Win32::DBIODBC - Win32::ODBC emulation layer for the DBI

SYNOPSIS

use Win32::DBIODBC;     # instead of use Win32::ODBC

DESCRIPTION

This is a very basic very alpha quality Win32::ODBC emulation for the DBI. To use it just replace

use Win32::ODBC;

in your scripts with

use Win32::DBIODBC;

or, while experimenting, you can pre-load this module without changing your scripts by doing

perl -MWin32::DBIODBC your_script_name

TO DO

Error handling is virtually non-existent.

AUTHOR

Tom Horen <tho@melexis.com>