205 lines
7.1 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2015-1922",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2015-07-20T01:59:05.097",
"lastModified": "2018-09-26T10:29:10.333",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The Data Movement implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to bypass intended access restrictions and delete table rows via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad en la implementaci\u00f3n de Data Movement en IBM DB2 9.7 a trav\u00e9s de FP10, 9.8 a trav\u00e9s de FP5, 10.1 anterior a FP5 y 10.5 a trav\u00e9s de FP5 en Linux, UNIX y Windows, permite a usuarios remotos autenticados evadir las restricciones de acceso previstos y eliminara filas de la tabla a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:advanced_enterprise:*:*:*",
"matchCriteriaId": "3D9E7D2A-42B9-4D07-A107-BBD839E59858"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:advanced_workgroup:*:*:*",
"matchCriteriaId": "FD27164C-7554-46E1-B755-27C74D2EC3B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "F199F7B4-F273-4D45-AE08-7B5DAE6E0794"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:express:*:*:*",
"matchCriteriaId": "ACEB3F4A-6411-4456-9B89-A43562189BD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:workgroup:*:*:*",
"matchCriteriaId": "1749B7DC-08BB-474B-BA5A-52602459C8EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:9.8:*:*:*:advanced_enterprise:*:*:*",
"matchCriteriaId": "025FA405-0FD2-4B19-8FA4-15581085BD15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:9.8:*:*:*:advanced_workgroup:*:*:*",
"matchCriteriaId": "F425C545-39CD-483C-97A3-BE0DC3EE63DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:9.8:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "6A6A7680-D883-414F-965B-1D6136760CA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:9.8:*:*:*:express:*:*:*",
"matchCriteriaId": "76107CFE-EB32-4AF6-9AF9-F16238F9C671"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:9.8:*:*:*:workgroup:*:*:*",
"matchCriteriaId": "7D1225B0-DBFF-4A13-93CB-1B64AF9ACE47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:advanced_enterprise:*:*:*",
"matchCriteriaId": "2ECC11D3-7D77-4823-8B34-DD76E131D74C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:advanced_workgroup:*:*:*",
"matchCriteriaId": "E1D36687-32AF-43E2-97D9-FDF602F89318"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "DD80ADF4-35D3-4534-AACD-C00D80870723"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:express:*:*:*",
"matchCriteriaId": "8D274B00-C986-4A5D-94B2-79F4A613D951"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:workgroup:*:*:*",
"matchCriteriaId": "67A935CA-7AF6-4DA9-958E-DF4BC8E2B3BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:advanced_enterprise:*:*:*",
"matchCriteriaId": "A6B1A4DC-7062-4349-8D1A-3DE4B0E68FC8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:advanced_workgroup:*:*:*",
"matchCriteriaId": "B3681F43-F23B-413D-B871-A40821F4988B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "AE645126-ECD0-40FB-B2BA-5C9EF33EBE69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:express:*:*:*",
"matchCriteriaId": "9AFEA656-426C-4F18-9737-8985531C7A93"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:workgroup:*:*:*",
"matchCriteriaId": "09B0333F-0E27-40B3-A0DC-618BEA97CBC2"
}
]
}
]
}
],
"references": [
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT08523",
"source": "psirt@us.ibm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT08524",
"source": "psirt@us.ibm.com"
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT08525",
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT08526",
"source": "psirt@us.ibm.com"
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959650",
"source": "psirt@us.ibm.com"
},
{
"url": "http://www.securityfocus.com/bid/75911",
"source": "psirt@us.ibm.com"
},
{
"url": "http://www.securitytracker.com/id/1032879",
"source": "psirt@us.ibm.com"
}
]
}