HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 4.27 Circumvention of access control via ODBC

T 4.27 Circumvention of access control via ODBC

Existing access control of databases can be circumvented if databases are accessed via ODBC (Open Database Connectivity) and if the ODBC drivers were installed incorrectly. This might result in the violation of confidential data and the manipulation of data in general.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
 
home