2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-4325" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2009-12-16T18:30:00.327" ,
2025-04-09 02:05:49 +00:00
"lastModified" : "2025-04-09T00:30:58.490" ,
"vulnStatus" : "Deferred" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The Client Interfaces component in IBM DB2 8.2 before FP18, 9.1 before FP8, 9.5 before FP5, and 9.7 before FP1 does not validate an unspecified pointer, which allows attackers to overwrite \"external memory\" via unknown vectors, related to a missing \"check for null pointers.\""
} ,
{
"lang" : "es" ,
"value" : "El componente Client Interfaces en IBM DB2 v8.2 anterior a FP18, v9.1 anterior a FP8, v9.5 anterior a FP5 y v9.7 anterior a FP1, no valida adecuadamente un puntero no especificado, lo que permite a atacantes sobrescribir la memoria externa a trav\u00e9s de vectores desconocidos. Relacionado con la p\u00e9rdida de \"comprobaci\u00f3n de punteros nulos\"."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:P" ,
2024-11-22 11:14:00 +00:00
"baseScore" : 6.4 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 11:14:00 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 4.9 ,
"acInsufInfo" : true ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-20"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "64D7ACC0-4CF4-4B60-902C-C47DFCD097A9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:fp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "55ABF9A3-7776-4C0B-A6CC-45955E42DA1B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:fp10:*:*:*:*:*:*" ,
"matchCriteriaId" : "68B64CBF-7A11-4AA9-8C44-77E891DD2446"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:fp11:*:*:*:*:*:*" ,
"matchCriteriaId" : "9AEB3163-D0D0-4E43-AF64-479D4AEE90C0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:fp12:*:*:*:*:*:*" ,
"matchCriteriaId" : "0E3BC415-D3D2-48FC-9B6A-34596A371ACF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:fp13:*:*:*:*:*:*" ,
"matchCriteriaId" : "BA84C4CF-D486-4D21-A909-C311BF70CE14"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:fp14:*:*:*:*:*:*" ,
"matchCriteriaId" : "4BC02E85-73EC-408B-A31E-F2DDFEA8EF13"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:fp15:*:*:*:*:*:*" ,
"matchCriteriaId" : "B7CB2C4F-A038-461E-9FAB-FA4186F83817"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:fp16:*:*:*:*:*:*" ,
"matchCriteriaId" : "6DA81141-A4CF-42AD-AFE4-6336AF77ED9C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:fp17:*:*:*:*:*:*" ,
"matchCriteriaId" : "5BF822C3-48F0-4B13-9D81-FA04DC5B9DD9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:fp2:*:*:*:*:*:*" ,
"matchCriteriaId" : "9DF77950-22DE-4BA2-A10F-10953F6119E6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:fp3:*:*:*:*:*:*" ,
"matchCriteriaId" : "57F66472-61EC-4467-ACF6-2893BF9E4050"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:fp4:*:*:*:*:*:*" ,
"matchCriteriaId" : "403EF6EC-9EEF-40F1-BA5C-F6211AADC9A2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:fp5:*:*:*:*:*:*" ,
"matchCriteriaId" : "2CE8E119-58C7-4BF0-9C74-93F44E4FC732"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:fp6:*:*:*:*:*:*" ,
"matchCriteriaId" : "2F16D689-D091-47AA-96EC-6B419D4A6CD2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:fp7:*:*:*:*:*:*" ,
"matchCriteriaId" : "AAEFCEBE-4CBC-4301-BEC6-9D9C9C3E0539"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:fp8:*:*:*:*:*:*" ,
"matchCriteriaId" : "B7130E8C-3D8D-4AAF-9D42-55236131989D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:fp9:*:*:*:*:*:*" ,
"matchCriteriaId" : "496D052A-CD28-4888-A59C-4F45E9F1471F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7B28091A-8772-41DC-9D91-D5359CDDA7A9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.1:fp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "2AF419E7-F2B5-4E2A-B85D-C0EC6C1DEA4F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.1:fp2:*:*:*:*:*:*" ,
"matchCriteriaId" : "95BBA3F1-C276-4C30-BFE5-9CE212BEBEFA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.1:fp3:*:*:*:*:*:*" ,
"matchCriteriaId" : "4DF01163-F805-4FC8-9836-462034D1B5CF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.1:fp3a:*:*:*:*:*:*" ,
"matchCriteriaId" : "E570E88C-35F8-4E12-8121-20536AC8A0AB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.1:fp4:*:*:*:*:*:*" ,
"matchCriteriaId" : "757E30FB-2EFB-4B3D-9931-17D584D433A2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.1:fp4a:*:*:*:*:*:*" ,
"matchCriteriaId" : "B31F9D02-25FD-4ED1-9D1C-B244BC9426B6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.1:fp5:*:*:*:*:*:*" ,
"matchCriteriaId" : "47455B4A-6E10-417F-9974-B0AA7F3180FE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.1:fp6:*:*:*:*:*:*" ,
"matchCriteriaId" : "84156C5B-EFC6-4733-A868-C3C51CFBA7CD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.1:fp6a:*:*:*:*:*:*" ,
"matchCriteriaId" : "FA8ABABB-F84D-41F0-A894-56911AF6E7E7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.1:fp7:*:*:*:*:*:*" ,
"matchCriteriaId" : "3D511307-1EBB-408B-BCDE-C6BEFCF154C5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "11ABF7CC-2FA5-4F2D-901A-2D0EF5B8E717"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.5:fp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "58147402-53D5-4F15-862B-EE3DCCD75E2C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.5:fp2:*:*:*:*:*:*" ,
"matchCriteriaId" : "D3F3CB5E-D4FB-4C03-B108-06CC358B1F45"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.5:fp2a:*:*:*:*:*:*" ,
"matchCriteriaId" : "CB2EA14A-878A-4D8D-B17A-568712D21C48"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.5:fp3:*:*:*:*:*:*" ,
"matchCriteriaId" : "84C925CD-E753-401F-9EC0-6E3D9861C818"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.5:fp3a:*:*:*:*:*:*" ,
"matchCriteriaId" : "651D042C-A9F1-42D1-A6DD-95ADBCD08448"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.5:fp3b:*:*:*:*:*:*" ,
"matchCriteriaId" : "0A589323-B8B8-4CB4-B1A9-B9E771C99123"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CE1C4DE6-EB32-4A31-9FAA-D8DA31D8CF05"
}
]
}
]
}
] ,
"references" : [
{
"url" : "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v91/APARLIST.TXT" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v97/APARLIST.TXT" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/37759" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IC64702" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1LI72709" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1LI74500" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1LI74504" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21293566" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21412902" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/37332" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/3520" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2024-11-22 11:14:00 +00:00
} ,
{
"url" : "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v91/APARLIST.TXT" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v97/APARLIST.TXT" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/37759" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IC64702" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1LI72709" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1LI74500" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1LI74504" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21293566" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21412902" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/37332" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/3520" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}