cve-2012-0711
Vulnerability from cvelistv5
Published
2012-03-20 20:00
Modified
2024-08-06 18:30
Severity ?
Summary
Integer signedness error in the db2dasrrm process in the DB2 Administration Server (DAS) in IBM DB2 9.1 through FP11, 9.5 before FP9, and 9.7 through FP5 on UNIX platforms allows remote attackers to execute arbitrary code via a crafted request that triggers a heap-based buffer overflow.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:30:54.182Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "db2-db2dasrrm-bo(73495)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73495"
          },
          {
            "name": "oval:org.mitre.oval:def:14842",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14842"
          },
          {
            "name": "77826",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/77826"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21588093"
          },
          {
            "name": "IC80728",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC80728"
          },
          {
            "name": "IC80729",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC80729"
          },
          {
            "name": "IC80561",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC80561"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer signedness error in the db2dasrrm process in the DB2 Administration Server (DAS) in IBM DB2 9.1 through FP11, 9.5 before FP9, and 9.7 through FP5 on UNIX platforms allows remote attackers to execute arbitrary code via a crafted request that triggers a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T09:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "db2-db2dasrrm-bo(73495)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73495"
        },
        {
          "name": "oval:org.mitre.oval:def:14842",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14842"
        },
        {
          "name": "77826",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/77826"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21588093"
        },
        {
          "name": "IC80728",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC80728"
        },
        {
          "name": "IC80729",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC80729"
        },
        {
          "name": "IC80561",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC80561"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2012-0711",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer signedness error in the db2dasrrm process in the DB2 Administration Server (DAS) in IBM DB2 9.1 through FP11, 9.5 before FP9, and 9.7 through FP5 on UNIX platforms allows remote attackers to execute arbitrary code via a crafted request that triggers a heap-based buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "db2-db2dasrrm-bo(73495)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73495"
            },
            {
              "name": "oval:org.mitre.oval:def:14842",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14842"
            },
            {
              "name": "77826",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/77826"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21588093",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21588093"
            },
            {
              "name": "IC80728",
              "refsource": "AIXAPAR",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC80728"
            },
            {
              "name": "IC80729",
              "refsource": "AIXAPAR",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC80729"
            },
            {
              "name": "IC80561",
              "refsource": "AIXAPAR",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC80561"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2012-0711",
    "datePublished": "2012-03-20T20:00:00",
    "dateReserved": "2012-01-17T00:00:00",
    "dateUpdated": "2024-08-06T18:30:54.182Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B28091A-8772-41DC-9D91-D5359CDDA7A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.1:fp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AF419E7-F2B5-4E2A-B85D-C0EC6C1DEA4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.1:fp10:*:*:*:*:*:*\", \"matchCriteriaId\": \"59E6D578-4727-4AA3-9313-97D9775AC41E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.1:fp11:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC28AABC-88E8-480B-9A3B-D58B7B7EFC17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.1:fp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"95BBA3F1-C276-4C30-BFE5-9CE212BEBEFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.1:fp2a:*:*:*:*:*:*\", \"matchCriteriaId\": \"A39759EE-5166-4122-8EFD-93CD79909403\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.1:fp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DF01163-F805-4FC8-9836-462034D1B5CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.1:fp3a:*:*:*:*:*:*\", \"matchCriteriaId\": \"E570E88C-35F8-4E12-8121-20536AC8A0AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.1:fp4:*:*:*:*:*:*\", \"matchCriteriaId\": \"757E30FB-2EFB-4B3D-9931-17D584D433A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.1:fp4a:*:*:*:*:*:*\", \"matchCriteriaId\": \"B31F9D02-25FD-4ED1-9D1C-B244BC9426B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.1:fp5:*:*:*:*:*:*\", \"matchCriteriaId\": \"47455B4A-6E10-417F-9974-B0AA7F3180FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.1:fp6:*:*:*:*:*:*\", \"matchCriteriaId\": \"84156C5B-EFC6-4733-A868-C3C51CFBA7CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.1:fp6a:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA8ABABB-F84D-41F0-A894-56911AF6E7E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.1:fp7:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D511307-1EBB-408B-BCDE-C6BEFCF154C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.1:fp7a:*:*:*:*:*:*\", \"matchCriteriaId\": \"C31FDCBF-B3EC-4B01-8D10-D05108FD51E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.1:fp8:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DF94D3C-3C23-4F22-B9B6-658C23E7BAF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.1:fp9:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C26F7EA-4A39-4244-87C9-397AE1C4B34C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11ABF7CC-2FA5-4F2D-901A-2D0EF5B8E717\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.5:fp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"58147402-53D5-4F15-862B-EE3DCCD75E2C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.5:fp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3F3CB5E-D4FB-4C03-B108-06CC358B1F45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.5:fp2a:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB2EA14A-878A-4D8D-B17A-568712D21C48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.5:fp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"84C925CD-E753-401F-9EC0-6E3D9861C818\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.5:fp3a:*:*:*:*:*:*\", \"matchCriteriaId\": \"651D042C-A9F1-42D1-A6DD-95ADBCD08448\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.5:fp3b:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A589323-B8B8-4CB4-B1A9-B9E771C99123\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.5:fp4:*:*:*:*:*:*\", \"matchCriteriaId\": \"61252AF9-A231-442A-A473-BA0608323BF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.5:fp4a:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB37A1AA-58F0-4A39-8E38-C70692CE67BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.5:fp5:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D9D5B5B-8E23-4987-9BBE-8FE1F27CB1B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.5:fp6:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3E12C63-19FF-4BB9-9389-BF5E6B493F42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.5:fp6a:*:*:*:*:*:*\", \"matchCriteriaId\": \"10456C00-127D-46FE-82A4-D567AB19F87A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.5:fp7:*:*:*:*:*:*\", \"matchCriteriaId\": \"E476599E-7087-4442-AED5-61DC1CA1F374\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.5:fp8:*:*:*:*:*:*\", \"matchCriteriaId\": \"93F5745A-219B-48F6-95E9-85B4E516FA94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE1C4DE6-EB32-4A31-9FAA-D8DA31D8CF05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.7:fp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"00A16349-5CF1-4E75-A6EE-218E85049F62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.7:fp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"5335C017-52D9-45D4-BCEB-CBB51B7C88AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.7:fp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"786B3F51-46A3-4A4C-A549-B80BA27EE3B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.7:fp3a:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB349DC8-2EC6-4A11-9BCD-9C49D36BA49D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.7:fp4:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC8D88E5-7942-4F21-B0BA-7D23F4537117\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:db2:9.7:fp5:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7A42A22-D615-4D60-8FC4-61CDF727FD54\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7F01A55-7C37-4BAF-A4D4-61E8AC54FF79\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"155AD4FB-E527-4103-BCEF-801B653DEA37\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11AEFEC9-5DB4-44CB-977D-6561DC1680C1\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Integer signedness error in the db2dasrrm process in the DB2 Administration Server (DAS) in IBM DB2 9.1 through FP11, 9.5 before FP9, and 9.7 through FP5 on UNIX platforms allows remote attackers to execute arbitrary code via a crafted request that triggers a heap-based buffer overflow.\"}, {\"lang\": \"es\", \"value\": \"Un error de entero sin signo en el proceso db2dasrrm del servidor de administraci\\u00f3n de DB2 (DAS) en IBM DB2 v9.1 hasta FP11, v9.5 antes de vFP9, y v9.7 hasta FP5 para UNIX permite a atacantes remotos ejecutar c\\u00f3digo de su elecci\\u00f3n a trav\\u00e9s de una solicitud modificada a mano que ocasiona un desbordamiento del b\\u00fafer basado en memoria din\\u00e1mica.\"}]",
      "id": "CVE-2012-0711",
      "lastModified": "2024-11-21T01:35:35.423",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2012-03-20T20:55:01.320",
      "references": "[{\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg1IC80561\", \"source\": \"psirt@us.ibm.com\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg1IC80728\", \"source\": \"psirt@us.ibm.com\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg1IC80729\", \"source\": \"psirt@us.ibm.com\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21588093\", \"source\": \"psirt@us.ibm.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/77826\", \"source\": \"psirt@us.ibm.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/73495\", \"source\": \"psirt@us.ibm.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14842\", \"source\": \"psirt@us.ibm.com\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg1IC80561\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg1IC80728\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg1IC80729\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21588093\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/77826\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/73495\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14842\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "psirt@us.ibm.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-189\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-0711\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2012-03-20T20:55:01.320\",\"lastModified\":\"2024-11-21T01:35:35.423\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer signedness error in the db2dasrrm process in the DB2 Administration Server (DAS) in IBM DB2 9.1 through FP11, 9.5 before FP9, and 9.7 through FP5 on UNIX platforms allows remote attackers to execute arbitrary code via a crafted request that triggers a heap-based buffer overflow.\"},{\"lang\":\"es\",\"value\":\"Un error de entero sin signo en el proceso db2dasrrm del servidor de administraci\u00f3n de DB2 (DAS) en IBM DB2 v9.1 hasta FP11, v9.5 antes de vFP9, y v9.7 hasta FP5 para UNIX permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una solicitud modificada a mano que ocasiona un desbordamiento del b\u00fafer basado en memoria din\u00e1mica.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B28091A-8772-41DC-9D91-D5359CDDA7A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.1:fp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AF419E7-F2B5-4E2A-B85D-C0EC6C1DEA4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.1:fp10:*:*:*:*:*:*\",\"matchCriteriaId\":\"59E6D578-4727-4AA3-9313-97D9775AC41E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.1:fp11:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC28AABC-88E8-480B-9A3B-D58B7B7EFC17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.1:fp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"95BBA3F1-C276-4C30-BFE5-9CE212BEBEFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.1:fp2a:*:*:*:*:*:*\",\"matchCriteriaId\":\"A39759EE-5166-4122-8EFD-93CD79909403\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.1:fp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DF01163-F805-4FC8-9836-462034D1B5CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.1:fp3a:*:*:*:*:*:*\",\"matchCriteriaId\":\"E570E88C-35F8-4E12-8121-20536AC8A0AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.1:fp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"757E30FB-2EFB-4B3D-9931-17D584D433A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.1:fp4a:*:*:*:*:*:*\",\"matchCriteriaId\":\"B31F9D02-25FD-4ED1-9D1C-B244BC9426B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.1:fp5:*:*:*:*:*:*\",\"matchCriteriaId\":\"47455B4A-6E10-417F-9974-B0AA7F3180FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.1:fp6:*:*:*:*:*:*\",\"matchCriteriaId\":\"84156C5B-EFC6-4733-A868-C3C51CFBA7CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.1:fp6a:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA8ABABB-F84D-41F0-A894-56911AF6E7E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.1:fp7:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D511307-1EBB-408B-BCDE-C6BEFCF154C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.1:fp7a:*:*:*:*:*:*\",\"matchCriteriaId\":\"C31FDCBF-B3EC-4B01-8D10-D05108FD51E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.1:fp8:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DF94D3C-3C23-4F22-B9B6-658C23E7BAF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.1:fp9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C26F7EA-4A39-4244-87C9-397AE1C4B34C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11ABF7CC-2FA5-4F2D-901A-2D0EF5B8E717\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.5:fp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"58147402-53D5-4F15-862B-EE3DCCD75E2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.5:fp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3F3CB5E-D4FB-4C03-B108-06CC358B1F45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.5:fp2a:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB2EA14A-878A-4D8D-B17A-568712D21C48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.5:fp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"84C925CD-E753-401F-9EC0-6E3D9861C818\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.5:fp3a:*:*:*:*:*:*\",\"matchCriteriaId\":\"651D042C-A9F1-42D1-A6DD-95ADBCD08448\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.5:fp3b:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A589323-B8B8-4CB4-B1A9-B9E771C99123\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.5:fp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"61252AF9-A231-442A-A473-BA0608323BF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.5:fp4a:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB37A1AA-58F0-4A39-8E38-C70692CE67BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.5:fp5:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D9D5B5B-8E23-4987-9BBE-8FE1F27CB1B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.5:fp6:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3E12C63-19FF-4BB9-9389-BF5E6B493F42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.5:fp6a:*:*:*:*:*:*\",\"matchCriteriaId\":\"10456C00-127D-46FE-82A4-D567AB19F87A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.5:fp7:*:*:*:*:*:*\",\"matchCriteriaId\":\"E476599E-7087-4442-AED5-61DC1CA1F374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.5:fp8:*:*:*:*:*:*\",\"matchCriteriaId\":\"93F5745A-219B-48F6-95E9-85B4E516FA94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE1C4DE6-EB32-4A31-9FAA-D8DA31D8CF05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.7:fp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"00A16349-5CF1-4E75-A6EE-218E85049F62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.7:fp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5335C017-52D9-45D4-BCEB-CBB51B7C88AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.7:fp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"786B3F51-46A3-4A4C-A549-B80BA27EE3B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.7:fp3a:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB349DC8-2EC6-4A11-9BCD-9C49D36BA49D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.7:fp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC8D88E5-7942-4F21-B0BA-7D23F4537117\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:9.7:fp5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7A42A22-D615-4D60-8FC4-61CDF727FD54\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7F01A55-7C37-4BAF-A4D4-61E8AC54FF79\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"155AD4FB-E527-4103-BCEF-801B653DEA37\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11AEFEC9-5DB4-44CB-977D-6561DC1680C1\"}]}]}],\"references\":[{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC80561\",\"source\":\"psirt@us.ibm.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC80728\",\"source\":\"psirt@us.ibm.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC80729\",\"source\":\"psirt@us.ibm.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21588093\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/77826\",\"source\":\"psirt@us.ibm.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/73495\",\"source\":\"psirt@us.ibm.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14842\",\"source\":\"psirt@us.ibm.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC80561\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC80728\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC80729\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21588093\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/77826\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/73495\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14842\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.