2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-2754" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2010-03-05T16:30:00.583" ,
2024-11-22 11:14:00 +00:00
"lastModified" : "2024-11-21T01:05:40.263" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Integer signedness error in the authentication functionality in librpc.dll in the Informix Storage Manager (ISM) Portmapper service (aka portmap.exe), as used in IBM Informix Dynamic Server (IDS) 10.x before 10.00.TC9 and 11.x before 11.10.TC3 and EMC Legato NetWorker, allows remote attackers to execute arbitrary code via a crafted parameter size that triggers a stack-based buffer overflow."
} ,
{
"lang" : "es" ,
"value" : "Error de entero sin signo en la funcionalidad de autenticaci\u00f3n en librpc.dll en Informix Storage Manager (ISM) Portmapper service (aka portmap.exe), tal y como se utiliza en IBM Informix Dynamic Server (IDS) v10.x anteriores a la v10.00.TC9 y v11.x anteriores a v11.10.TC3 y EMC Legato NetWorker, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un par\u00e1metro manipulado en tama\u00f1o que inicia un desbordamiento de b\u00fafer basado en la pila."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C" ,
2024-11-22 11:14:00 +00:00
"baseScore" : 10.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-22 11:14:00 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-189"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1716E256-B186-442F-8C4C-9305E0953081"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.tc1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DEEBB378-F57A-4420-973F-8B641700740A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5634CF97-CBD3-4CA3-8144-2F875FDD3FA4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc2e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2C2380EC-4F4E-434F-9103-02BA0F8E68EF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C7931542-8DB8-4BC3-A319-9352EBC62158"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc3e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B7252409-BAB0-41C5-8D82-09FDB751EB3B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "795E3755-48D3-4A70-9AFB-1B3B9F3B8F52"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc4e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "97D142F8-076C-42E4-A1C3-8DDA45605340"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7FB0B784-F6C0-4333-91C3-F01C23C20C72"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc5e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8F475C2E-32D9-40EF-82D5-72B827774F17"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9A6FFFAC-9FBD-44B7-9F12-53CF653F9F6E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc6e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A095762C-9A12-475A-B77A-8B5DA6333AEC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0EB862D4-E158-4BDD-A35D-7CF35D42561B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc7e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7921875E-57C4-47D8-ADD5-E65980D2B24C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8C5A7699-3614-4C07-B0D0-92C05F593A17"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc8e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3BAE6B0C-7F7E-41B0-AC9D-75BED81F5878"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A6770AAD-CB91-49DF-9B2D-DCFB5880C833"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc9e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "95E7DC6E-7A0D-4FFB-8641-1F25AAFE5D5C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CA609752-9DE0-4080-94FC-85337DA15757"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc10e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "29202E83-5F00-4200-9A36-AB06A1370E67"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:11.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BE53870D-832F-4300-8556-9062BCC8F9B8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:11.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F3398187-9A9C-4584-A186-01DB36C88219"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BC21790C-D057-4B11-8D0C-202B71B1E7A4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc1de:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1D7F320F-72E0-440C-A300-6D85AEE86DA9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "539DE4E7-8531-43E8-AE75-178BFC4324F7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc2e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "487A81FC-FBB9-43C6-B419-4BA033054CEB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "429D6E5F-E249-4EA5-B2BB-DDF3B2B20676"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc3e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D8BA02BE-9028-457F-A231-5C27BE442042"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:emc:legato_networker:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "78A324AC-8E82-42B9-910E-9131B2AD26B4"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://knowledgebase.emc.com/emcice/login.do?sType=ax1990&sName=1204&id=emc183834" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/38731" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1IC55329" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1IC55330" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/509793/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/38472" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2010/0508" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2010/0509" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-10-023" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/56586" ,
"source" : "cve@mitre.org"
2024-11-22 11:14:00 +00:00
} ,
{
"url" : "http://knowledgebase.emc.com/emcice/login.do?sType=ax1990&sName=1204&id=emc183834" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/38731" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1IC55329" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1IC55330" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/509793/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/38472" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2010/0508" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2010/0509" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-10-023" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/56586" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}