209 lines
7.6 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-4866",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-12-31T05:00:00.000",
"lastModified": "2017-07-29T01:29:19.967",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in JDBC Applet Server in IBM DB2 8.1 allows remote attackers to execute arbitrary by connecting and sending a long username, then disconnecting gracefully and reconnecting and sending a short username and an unexpected db2java.zip version, which causes a null terminator to be removed and leads to the overflow."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:7.0:*:aix:*:*:*:*:*",
"matchCriteriaId": "889CAF38-6DFA-4185-BB20-62D7AC8E607E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:7.0:*:hp-ux:*:*:*:*:*",
"matchCriteriaId": "74DC6B16-4519-41FC-84A7-DF5D74909018"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:7.0:*:linux:*:*:*:*:*",
"matchCriteriaId": "6EA810DB-104E-412A-8B6E-DBB5BEE743A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:7.0:*:solaris:*:*:*:*:*",
"matchCriteriaId": "515EB611-B1FA-467C-91EF-C5A15BE54C5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:7.1:*:aix:*:*:*:*:*",
"matchCriteriaId": "AAB0D5A7-4649-4427-A298-AB8BE83BA898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:7.1:*:hp-ux:*:*:*:*:*",
"matchCriteriaId": "D1065FBC-D8F9-4E61-AA00-E26D10477152"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:7.1:*:linux:*:*:*:*:*",
"matchCriteriaId": "56D0096E-8145-4A36-BC18-A9C5C780D1A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:7.1:*:solaris:*:*:*:*:*",
"matchCriteriaId": "3582B88E-655E-4258-A60D-99D9F01EE698"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:7.1:*:windows:*:*:*:*:*",
"matchCriteriaId": "BE7D9100-F344-49B7-A542-2A7035FBFF41"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:7.2:*:aix:*:*:*:*:*",
"matchCriteriaId": "F2CD0B87-4557-4EC9-9082-B7F23113D911"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:7.2:*:hp-ux:*:*:*:*:*",
"matchCriteriaId": "E77E8381-FC86-406E-8AC5-CA62415665D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:7.2:*:linux:*:*:*:*:*",
"matchCriteriaId": "80DE2026-D9F0-4AAA-97E6-F4FB0EBDB265"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:7.2:*:solaris:*:*:*:*:*",
"matchCriteriaId": "E6F25EED-2F22-4066-8EBF-82B78E4518F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:7.2:*:windows:*:*:*:*:*",
"matchCriteriaId": "6EBDEDDF-DBBA-4CD9-8CDE-5182246936D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.0:*:aix:*:*:*:*:*",
"matchCriteriaId": "95E13DED-D8B2-4895-8540-B0C59CB6E672"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.0:*:hp-ux:*:*:*:*:*",
"matchCriteriaId": "71C09529-B8EA-4E39-9606-84EFE693A459"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.0:*:linux:*:*:*:*:*",
"matchCriteriaId": "6F180189-FA62-453A-B6F8-134FE12805EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.0:*:solaris:*:*:*:*:*",
"matchCriteriaId": "0656D0A4-E09E-4C5E-9270-931433598B7B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.0:*:windows:*:*:*:*:*",
"matchCriteriaId": "39F9063B-982D-46C0-BE50-57DAE0F83174"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.1:*:aix:*:*:*:*:*",
"matchCriteriaId": "3DC757E1-EC37-48C5-BE72-53184624ACDC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.1:*:hp_ux:*:*:*:*:*",
"matchCriteriaId": "0D220944-974E-4620-86DB-3687CF219294"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.1:*:linux:*:*:*:*:*",
"matchCriteriaId": "BEB7068D-B900-418A-88A4-6F35122D8302"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.1:*:solaris:*:*:*:*:*",
"matchCriteriaId": "D75154B0-4B86-41C7-BD04-9AE21647F27F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.1:*:windows:*:*:*:*:*",
"matchCriteriaId": "620663C7-8AA1-430F-AF00-32F5EF7C65B6"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=110495251101381&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IY61492",
"source": "cve@mitre.org"
},
{
"url": "http://www.nextgenss.com/advisories/db205012005D.txt",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/11401",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17613",
"source": "cve@mitre.org"
}
]
}