2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2006-4257" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2006-08-21T20:04:00.000" ,
2024-11-22 03:16:05 +00:00
"lastModified" : "2024-11-21T00:15:30.563" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "IBM DB2 Universal Database (UDB) before 8.1 FixPak 13 allows remote authenticated users to cause a denial of service (crash) by (1) sending the first ACCSEC command without an RDBNAM parameter during the CONNECT process, or (2) sending crafted SQLJRA packet, which results in a null dereference."
} ,
{
"lang" : "es" ,
"value" : "IBM DB2 Universal Database (UDB) anterior a 8.1 FixPak 13 permite a atacantes autenticados remotamente provocar una denegaci\u00f3n de servicio (ca\u00edda) (1) enviando el primer comando ACCSEC sin un par\u00e1metro RDBNAM durante el proceso de conexi\u00f3n (CONNECT), o (2) enviando paquetes SQLJRA manipulados, lo cual resulta en una referencia a nulo."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:S/C:N/I:N/A:P" ,
2024-11-22 03:16:05 +00:00
"baseScore" : 4.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-22 03:16:05 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-399"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.0:*:aix:*:*:*:*:*" ,
"matchCriteriaId" : "CFCC258E-BF48-4D05-805D-25F74A1BD4FC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.0:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "C937B416-678E-49BF-90A9-271A00DAF35C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.0:*:os_390:*:*:*:*:*" ,
"matchCriteriaId" : "3D57D2F4-6A8D-47E6-ADB6-A1D6FFE464C9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1:*:aix:*:*:*:*:*" ,
"matchCriteriaId" : "0864138D-6D70-4D85-A623-570CF08FC8A3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1:*:hp_ux:*:*:*:*:*" ,
"matchCriteriaId" : "3E6D6AF7-1083-45B6-8EEF-1C80CC4479FA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "0A847132-100A-4109-B890-803D297CB0C8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "98CA5DB1-AEB0-4F4E-A5CC-FC9F5929A29C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "7AAB0F57-3E37-4604-842F-372A963CCDF6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.4:*:aix:*:*:*:*:*" ,
"matchCriteriaId" : "E1A207FA-1E31-4E62-B0B5-EF86F4627692"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.4:*:hp_ux:*:*:*:*:*" ,
"matchCriteriaId" : "C9321C42-CAF0-4079-9389-17B2E3AE34D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.4:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "70FDFE4D-769C-4C7A-BCC7-217E05E5AED8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.4:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "F0898B3F-D18E-45CF-9D82-CCBC820727EE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.4:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "F441845B-9E1F-491C-A5D9-816F6649F00B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.5:*:aix:*:*:*:*:*" ,
"matchCriteriaId" : "DD4D9995-B739-4C5D-92C7-372B9AB2BD58"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.5:*:hp_ux:*:*:*:*:*" ,
"matchCriteriaId" : "7FA427F3-DD47-4359-8514-F02C398A8E46"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.5:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "A220316D-6D0C-47A7-994E-1D8A2CF5D628"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.5:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "1C64CAA9-5BE7-4600-AF7E-9CE480861BF8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.5:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "E076BD5E-5A25-4EBA-BC8F-FDE8D63FA595"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.6:*:aix:*:*:*:*:*" ,
"matchCriteriaId" : "0861D4F3-46F1-4A9F-B2A9-4A6756E9706C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.6:*:hp_ux:*:*:*:*:*" ,
"matchCriteriaId" : "CB16643D-7BD5-41F3-AA61-F6640EDE22CF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.6:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "29EED40E-A3A2-4F25-8627-2FF60C94BC19"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.6:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "E75FED7D-2B5C-4C7D-AF3A-956F2FF8C149"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.6:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "BE40BCCF-93BB-4B32-8E55-0BD9532E3BF8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.6c:*:aix:*:*:*:*:*" ,
"matchCriteriaId" : "5E0C7B84-66C4-4FE5-9412-FBD5DBB4323E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.6c:*:hp_ux:*:*:*:*:*" ,
"matchCriteriaId" : "46320B9E-3FA7-4AF6-80ED-7A89C2678F8B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.6c:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "32041E5A-2DF1-46FA-A520-FFD451AE30BF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.6c:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "43A1F69A-49B6-43E5-A0E2-2572EBBB49C4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.6c:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "F05D503A-106D-4192-A1E4-BDB5535ACC4E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.7:*:aix:*:*:*:*:*" ,
"matchCriteriaId" : "38F090EF-53EE-4F21-9B8B-C8C42AD4C121"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.7:*:hp_ux:*:*:*:*:*" ,
"matchCriteriaId" : "828C5C06-4711-4C57-9657-3CAAAF76DCF2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.7:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "BF84E6DF-D9E3-4835-BCE1-2B47DB9DC5E9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.7:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "A7C1ED00-7D98-4F8E-B6A8-C9C16B27196E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.7:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "7757DA05-C0A8-49EC-99D4-99AE95CBB2D6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.7b:*:aix:*:*:*:*:*" ,
"matchCriteriaId" : "3C334DEF-07A5-4377-85C1-D3623A0904FA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.7b:*:hp_ux:*:*:*:*:*" ,
"matchCriteriaId" : "9E1A0923-FCFB-4669-B3C7-7EC65B7CA288"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.7b:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "34F3CA5A-9FBF-4B35-851D-7A2D6FB0613F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.7b:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "9CF93B79-4866-448C-A230-4C2F8AAB467B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.7b:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "6EFCAD6F-4741-41B9-AE3E-5F02B8DD90C2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.8:*:aix:*:*:*:*:*" ,
"matchCriteriaId" : "E70C9CA6-890A-4E8D-A625-82538402D336"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.8:*:hp_ux:*:*:*:*:*" ,
"matchCriteriaId" : "07F0C470-B9D9-4327-A918-FEAEC1BF9436"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.8:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "5D454393-D17F-48DB-84DA-05E61D8805F4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.8:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "61C20E8F-04F8-4609-BC49-C71A2C01739C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.8:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "4ADB7290-1954-4873-9B90-772704B2177C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.8a:*:aix:*:*:*:*:*" ,
"matchCriteriaId" : "2D5AB9D5-D732-4C6C-9BCC-6DBA3809780B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.8a:*:hp_ux:*:*:*:*:*" ,
"matchCriteriaId" : "33A46387-BA75-4ECE-AFC0-EF69425E0940"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.8a:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "7EAD4BCC-88F8-4ED8-A5ED-4E5EFC66CDAC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.8a:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "4540F5C4-B859-4AFD-88ED-029700785D15"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.8a:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "6A224945-8A17-4DBD-BB14-8E8BD476A904"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.9:*:aix:*:*:*:*:*" ,
"matchCriteriaId" : "8944A5FC-6258-4740-9373-491F8C41DD35"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.9:*:hp_ux:*:*:*:*:*" ,
"matchCriteriaId" : "C99162AE-739B-497B-94B2-7EEA79C5812D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.9:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "5D1B08DC-F52B-439B-827D-4BE4ECA78A55"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.9:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "4313BEDA-BCC5-47E6-934B-58AE8DD21FD0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.9:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "D3DE2356-73EB-47D4-BEEF-E9AB8B1FF0FD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.9a:*:aix:*:*:*:*:*" ,
"matchCriteriaId" : "4C3AA6C4-7700-4637-8B75-ABED7D8993A1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.9a:*:hp_ux:*:*:*:*:*" ,
"matchCriteriaId" : "E9A95C89-E9CC-49A2-8395-F3D89774966D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.9a:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "B730265C-358D-4BBF-8B40-48D943114E3C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.9a:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "719F646C-3958-4469-9C17-430E394E8D70"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.1.9a:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "86D936F6-2DC0-4BC3-943E-A5C9F2319206"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.2:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "67C33265-E3BC-406B-9986-E977CDE768FA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.10:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "7ED5600A-BD0C-4E48-A8B5-6833883A8981"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.10:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "1CD16421-5F61-46EB-B23C-2267DA0B5FE7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.10:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "F680EF69-C60C-482A-A301-E335EBB34217"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.12:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "4CC41143-ADD4-47D0-876A-5C3AB6E94CFD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.12:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "00C357A5-DCAF-4F5C-9B83-144D0AB74F02"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2:8.12:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "47D6DC83-FEBC-4C0B-A774-C55775BB2DF6"
}
]
}
]
}
] ,
"references" : [
2024-11-22 03:16:05 +00:00
{
"url" : "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/21550" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg24013114" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.appsecinc.com/resources/alerts/db2/2006-09-05.shtml" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/445298/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/454307/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/19586" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/3328" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2024-11-22 03:16:05 +00:00
} ,
{
"url" : "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/21550" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg24013114" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.appsecinc.com/resources/alerts/db2/2006-09-05.shtml" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/445298/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/454307/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/19586" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/3328" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}