{ "id": "CVE-2011-1208", "sourceIdentifier": "cve@mitre.org", "published": "2011-05-05T02:39:46.090", "lastModified": "2017-08-17T01:34:00.353", "vulnStatus": "Modified", "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n'CWE-476: NULL Pointer Dereference'", "descriptions": [ { "lang": "en", "value": "IBM solidDB 4.5.x before 4.5.182, 6.0.x before 6.0.1069, 6.1.x and 6.3.x before 6.3 FP8 (aka 6.3.49), and 6.5.x before 6.5 FP4 (aka 6.5.0.4) does not properly handle the (1) rpc_test_svc_readwrite and (2) rpc_test_svc_done commands, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted command." }, { "lang": "es", "value": "IBM solidDB 4.5.x anteriores a 4.5.182, 6.0.x anteriores a 6.0.1069, 6.1.x y 6.3.x anteriores a 6.3 FP8 (tambi\u00e9n conocido como 6.3.49), y 6.5.x anteriores a 6.5 FP4 (tambi\u00e9n conocido como 6.5.0.4) no maneja apropiadamente los comandos (1) rpc_test_svc_readwrite y (2) rpc_test_svc_done commands, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (resoluci\u00f3n de puntero NULL y ca\u00edda del demonio) a trav\u00e9s de un comando modificado." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:4.5.167:*:*:*:*:*:*:*", "matchCriteriaId": "8A0DA527-397A-47B4-AB5A-9BBC5A7DAA28" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:4.5.168:*:*:*:*:*:*:*", "matchCriteriaId": "17BC676A-05D1-4E4E-9D2F-33BCA932F4F0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:4.5.169:*:*:*:*:*:*:*", "matchCriteriaId": "B39D6B29-E377-43C9-AC3B-6AF1C6ADFE54" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:4.5.173:*:*:*:*:*:*:*", "matchCriteriaId": "40FBFD43-2751-4D92-B193-D0E2069A139C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:4.5.175:*:*:*:*:*:*:*", "matchCriteriaId": "55CB9B6C-B28E-42DC-982C-4DCA6A556ACF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:4.5.176:*:*:*:*:*:*:*", "matchCriteriaId": "E5D6921F-5C5D-476E-B711-165A0A44FBA2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:4.5.178:*:*:*:*:*:*:*", "matchCriteriaId": "DACBCB28-150F-44E2-AA56-EB61A67E4805" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:4.5.179:*:*:*:*:*:*:*", "matchCriteriaId": "76E0EDB9-23C2-4890-A091-BC44D9A62596" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:4.5.180:*:*:*:*:*:*:*", "matchCriteriaId": "039ED8A6-F80B-46DD-B591-7D6EBBE14CB4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:4.5.181:*:*:*:*:*:*:*", "matchCriteriaId": "CEF0142B-5DCE-4300-8137-0A1990D2AA41" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.0.1060:*:*:*:*:*:*:*", "matchCriteriaId": "52BFE67B-53D1-4D07-A90D-8103C0C06BCE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.0.1061:*:*:*:*:*:*:*", "matchCriteriaId": "1BAF8235-C7C6-4CBD-89AF-636ADD9F2C51" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.0.1064:*:*:*:*:*:*:*", "matchCriteriaId": "314B1005-9DEA-4F8C-9527-5F6A511A2B66" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.0.1065:*:*:*:*:*:*:*", "matchCriteriaId": "3E76225E-A7C1-4E52-B2C9-B3D491B2B1DA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.0.1066:*:*:*:*:*:*:*", "matchCriteriaId": "7D7CFB62-6B88-4A1E-8346-7F7BC8A6B3D9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.0.1067:*:*:*:*:*:*:*", "matchCriteriaId": "C53D246D-826F-42D4-887B-F05BFB5DD1B2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.0.1068:*:*:*:*:*:*:*", "matchCriteriaId": "1480DA44-FF29-48C0-8F20-144F7F6927BB" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "8C470235-C021-4BFD-B8A8-7A550D6F6FA3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "F979E6DD-CFDE-4A16-AC59-A2738A00749C" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.3.33:*:*:*:*:*:*:*", "matchCriteriaId": "6CC69E56-801F-4498-8284-A5E3542BE533" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.3.37:*:*:*:*:*:*:*", "matchCriteriaId": "B04C078E-F68C-4C01-90B7-E24BA1279402" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.3.38:*:*:*:*:*:*:*", "matchCriteriaId": "5441322D-6072-4A61-852B-01E59BBD6F93" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.3.39:*:*:*:*:*:*:*", "matchCriteriaId": "FA69EEDE-CEA5-4AA0-9DEF-4651DE01D9C6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.3.40:*:*:*:*:*:*:*", "matchCriteriaId": "C63BFFB0-4BFF-4243-AABB-89F1048BDBDF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.3.44:*:*:*:*:*:*:*", "matchCriteriaId": "C2C3E73F-71CA-4DD8-B9A2-B20E3FDD6109" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.3.47:*:*:*:*:*:*:*", "matchCriteriaId": "653AFFD4-B925-4FE1-8484-FB95FBBDE571" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.3.48:*:*:*:*:*:*:*", "matchCriteriaId": "27E00281-B911-460F-8CE3-CD2E6BBA9D19" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C7CD010-0CF0-4111-A056-40C134367809" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "36D87E5B-D3F5-4DE1-9AEE-EBC91E18D729" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5CBF08E2-20E5-4042-A782-4FE89823C33B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:soliddb:6.5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "59C7C86D-30BE-4BF0-A006-CB2FB3D674B7" } ] } ] } ], "references": [ { "url": "http://securitytracker.com/id?1025451", "source": "cve@mitre.org" }, { "url": "http://www.ibm.com/support/docview.wss?uid=swg21496106", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/47584", "source": "cve@mitre.org" }, { "url": "http://www.vupen.com/english/advisories/2011/1117", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-142/", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67019", "source": "cve@mitre.org" } ] }