2023-04-28 22:00:27 +02:00
{
"id" : "CVE-2023-25930" ,
"sourceIdentifier" : "psirt@us.ibm.com" ,
"published" : "2023-04-28T18:15:26.163" ,
2023-05-09 16:00:27 +02:00
"lastModified" : "2023-05-09T13:49:10.693" ,
"vulnStatus" : "Analyzed" ,
2023-04-28 22:00:27 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.1, 11.1, and 11.5 is vulnerable to a denial of service. Under rare conditions, setting a special register may cause the Db2 server to terminate abnormally. IBM X-Force ID: 247862."
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-05-09 16:00:27 +02:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 5.9 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.2 ,
"impactScore" : 3.6
} ,
2023-04-28 22:00:27 +02:00
{
"source" : "psirt@us.ibm.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 5.9 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.2 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
{
2023-05-09 16:00:27 +02:00
"source" : "nvd@nist.gov" ,
2023-04-28 22:00:27 +02:00
"type" : "Primary" ,
2023-05-09 16:00:27 +02:00
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
} ,
{
"source" : "psirt@us.ibm.com" ,
"type" : "Secondary" ,
2023-04-28 22:00:27 +02:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-20"
}
]
}
] ,
2023-05-09 16:00:27 +02:00
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.1" ,
"versionEndExcluding" : "11.1.4" ,
"matchCriteriaId" : "421BBE95-3D5B-421A-9DC1-8B08D019B2A3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.5" ,
"versionEndExcluding" : "11.5.8" ,
"matchCriteriaId" : "65161064-A4A3-48E5-AC0A-388429FF2F53"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:10.5:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "190AE881-F7BF-486E-BDAE-197337D70CDB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:10.5:fp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "8D1BAA43-4C77-4AC7-8561-93EDE0AED000"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:10.5:fp10:*:*:*:*:*:*" ,
"matchCriteriaId" : "F6FDF4D8-1822-43E6-AE65-3E4F8743D3A3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:10.5:fp2:*:*:*:*:*:*" ,
"matchCriteriaId" : "87C39880-D0E9-4487-9A80-B4D1A999032F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:10.5:fp3:*:*:*:*:*:*" ,
"matchCriteriaId" : "8842A8B6-E470-4536-AB5D-DA1C62A05F58"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:10.5:fp3a:*:*:*:*:*:*" ,
"matchCriteriaId" : "92BF0482-E4FE-454E-84DD-27074097F3F3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:10.5:fp4:*:*:*:*:*:*" ,
"matchCriteriaId" : "3705A79B-7903-4055-9CDC-55D60D2AC2E4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:10.5:fp5:*:*:*:*:*:*" ,
"matchCriteriaId" : "CBDFCE61-EE04-4901-844D-61B8966C1B81"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:10.5:fp6:*:*:*:*:*:*" ,
"matchCriteriaId" : "53A23363-413D-4785-B8C1-9AC2F96000EB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:10.5:fp7:*:*:*:*:*:*" ,
"matchCriteriaId" : "6E22D884-A33F-41D7-84CB-B6360A39863F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:10.5:fp8:*:*:*:*:*:*" ,
"matchCriteriaId" : "4DA56D35-93E9-4659-B180-2FD636A39BAB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:10.5:fp9:*:*:*:*:*:*" ,
"matchCriteriaId" : "6E7F0B02-EA0B-4BD1-AA0C-2A4735221963"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:11.1.4:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "7F91EC14-CD9A-42EB-9D81-6025A1D74749"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:11.1.4:fp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "5D098641-0833-4718-BB6A-273E1CA0F887"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:11.1.4:fp2:*:*:*:*:*:*" ,
"matchCriteriaId" : "8B451F96-2A58-4758-86E6-F8A030805C51"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:11.1.4:fp3:*:*:*:*:*:*" ,
"matchCriteriaId" : "69CBC98E-BECE-41A4-A0D9-9F3AC1602ABE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:11.1.4:fp4:*:*:*:*:*:*" ,
"matchCriteriaId" : "20386F14-BC32-4174-9F3A-F7406486976A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:11.1.4:fp5:*:*:*:*:*:*" ,
"matchCriteriaId" : "DD0DD54B-AB2E-4C56-B348-FF87C174270A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:11.1.4:fp6:*:*:*:*:*:*" ,
"matchCriteriaId" : "CC14EF40-FE00-47F9-8A78-98713F903D9C"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
] ,
2023-04-28 22:00:27 +02:00
"references" : [
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/247862" ,
2023-05-09 16:00:27 +02:00
"source" : "psirt@us.ibm.com" ,
"tags" : [
"VDB Entry" ,
"Vendor Advisory"
]
2023-04-28 22:00:27 +02:00
} ,
{
"url" : "https://https://www.ibm.com/support/pages/node/6985677" ,
2023-05-09 16:00:27 +02:00
"source" : "psirt@us.ibm.com" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2023-04-28 22:00:27 +02:00
}
]
}