2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2005-4867" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2005-12-31T05:00:00.000" ,
2024-11-22 01:07:11 +00:00
"lastModified" : "2024-11-21T00:05:22.307" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Stack-based buffer overflow in the SATENCRYPT function in IBM DB2 8.1, when Satellite Administration (SATADMIN) is enabled, allows remote attackers to execute arbitrary code via a long parameter."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:C/I:C/A:C" ,
2024-11-22 01:07:11 +00:00
"baseScore" : 9.3 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-22 01:07:11 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : true ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-119"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:7.0:*:aix:*:*:*:*:*" ,
"matchCriteriaId" : "889CAF38-6DFA-4185-BB20-62D7AC8E607E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:7.0:*:hp-ux:*:*:*:*:*" ,
"matchCriteriaId" : "74DC6B16-4519-41FC-84A7-DF5D74909018"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:7.0:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "6EA810DB-104E-412A-8B6E-DBB5BEE743A5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:7.0:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "515EB611-B1FA-467C-91EF-C5A15BE54C5C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:7.1:*:aix:*:*:*:*:*" ,
"matchCriteriaId" : "AAB0D5A7-4649-4427-A298-AB8BE83BA898"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:7.1:*:hp-ux:*:*:*:*:*" ,
"matchCriteriaId" : "D1065FBC-D8F9-4E61-AA00-E26D10477152"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:7.1:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "56D0096E-8145-4A36-BC18-A9C5C780D1A3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:7.1:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "3582B88E-655E-4258-A60D-99D9F01EE698"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:7.1:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "BE7D9100-F344-49B7-A542-2A7035FBFF41"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:7.2:*:aix:*:*:*:*:*" ,
"matchCriteriaId" : "F2CD0B87-4557-4EC9-9082-B7F23113D911"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:7.2:*:hp-ux:*:*:*:*:*" ,
"matchCriteriaId" : "E77E8381-FC86-406E-8AC5-CA62415665D4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:7.2:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "80DE2026-D9F0-4AAA-97E6-F4FB0EBDB265"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:7.2:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "E6F25EED-2F22-4066-8EBF-82B78E4518F6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:7.2:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "6EBDEDDF-DBBA-4CD9-8CDE-5182246936D0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:8.0:*:aix:*:*:*:*:*" ,
"matchCriteriaId" : "95E13DED-D8B2-4895-8540-B0C59CB6E672"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:8.0:*:hp-ux:*:*:*:*:*" ,
"matchCriteriaId" : "71C09529-B8EA-4E39-9606-84EFE693A459"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:8.0:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "6F180189-FA62-453A-B6F8-134FE12805EE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:8.0:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "0656D0A4-E09E-4C5E-9270-931433598B7B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:8.0:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "39F9063B-982D-46C0-BE50-57DAE0F83174"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:8.1:*:aix:*:*:*:*:*" ,
"matchCriteriaId" : "3DC757E1-EC37-48C5-BE72-53184624ACDC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:8.1:*:hp_ux:*:*:*:*:*" ,
"matchCriteriaId" : "0D220944-974E-4620-86DB-3687CF219294"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:8.1:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "BEB7068D-B900-418A-88A4-6F35122D8302"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:8.1:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "D75154B0-4B86-41C7-BD04-9AE21647F27F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:db2_universal_database:8.1:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "620663C7-8AA1-430F-AF00-32F5EF7C65B6"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://marc.info/?l=bugtraq&m=110495332301120&w=2" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/12733/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg21181228" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www-1.ibm.com/support/search.wss?rs=0&q=IY62040&apar=only" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.ngssoftware.com/advisories/db205012005E.txt" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/11396" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17612" ,
"source" : "cve@mitre.org"
2024-11-22 01:07:11 +00:00
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=110495332301120&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/12733/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg21181228" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www-1.ibm.com/support/search.wss?rs=0&q=IY62040&apar=only" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.ngssoftware.com/advisories/db205012005E.txt" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/11396" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17612" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}