René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

211 lines
6.9 KiB
JSON

{
"id": "CVE-2009-2859",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-08-19T17:30:01.217",
"lastModified": "2009-08-20T04:00:00.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM DB2 8.1 before FP18 allows attackers to obtain unspecified access via a das command."
},
{
"lang": "es",
"value": "IBM DB2 v8.1 anterior a FP18 permite a atacantes obtener acceso sin especificar a trav\u00e9s del comando \"das\"."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:fp17:*:*:*:*:*:*",
"versionEndIncluding": "8.1",
"matchCriteriaId": "00D40BBF-DAC1-4C6D-806B-B04C88F237F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp1:*:*:*:*:*:*",
"matchCriteriaId": "2418C923-2F94-4FAF-A9BD-D1C436308C3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp10:*:*:*:*:*:*",
"matchCriteriaId": "18D59696-A477-4397-BC14-4EF69DAFA262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp11:*:*:*:*:*:*",
"matchCriteriaId": "BBABCAC8-0E04-44FC-BF1A-88CACB28E644"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp12:*:*:*:*:*:*",
"matchCriteriaId": "AC318EEC-AFE5-4070-8711-B6560143CF9D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp13:*:*:*:*:*:*",
"matchCriteriaId": "5F02B3A6-F771-4F6A-A1E8-5E3EC1080272"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp14:*:*:*:*:*:*",
"matchCriteriaId": "DCF379F0-6D58-47A9-849E-C48D13496C87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp15:*:*:*:*:*:*",
"matchCriteriaId": "1F878C22-6294-4DFD-AFA4-1094644D15F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp17a:*:*:*:*:*:*",
"matchCriteriaId": "F2799A9D-1BAC-491A-B36B-A124C44D9EBB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp2:*:*:*:*:*:*",
"matchCriteriaId": "8AEBA7BD-E897-438E-8DD5-7AB5490AB931"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp3:*:*:*:*:*:*",
"matchCriteriaId": "BAA746B2-AC20-49D3-B8C6-655C268CB253"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp4:*:*:*:*:*:*",
"matchCriteriaId": "0FEC5C8E-9B3E-457F-8871-1EB172DBA7FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp4a:*:*:*:*:*:*",
"matchCriteriaId": "A8DA176E-1AD6-4524-9931-0165263D4E51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp5:*:*:*:*:*:*",
"matchCriteriaId": "AC4145E1-A805-4E64-904C-03B0B13BADBB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp6:*:*:*:*:*:*",
"matchCriteriaId": "281B0499-11FD-4B99-B402-B44B609469E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp6a:*:*:*:*:*:*",
"matchCriteriaId": "81AB9705-2397-4218-9529-E0DAF3196DAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp6b:*:*:*:*:*:*",
"matchCriteriaId": "2CB197BE-6C4B-4081-8643-3CC3D2FDDB28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp6c:*:*:*:*:*:*",
"matchCriteriaId": "53C13821-A069-41B8-AECD-8562E22F37D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp7:*:*:*:*:*:*",
"matchCriteriaId": "385C934A-4374-491C-8A61-EBCC5E72AF24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp7a:*:*:*:*:*:*",
"matchCriteriaId": "F7A4B9D8-D8FE-4204-8D09-1C69B9676F4A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp8:*:*:*:*:*:*",
"matchCriteriaId": "286E4585-57F7-428D-B9C2-63B33FA2BF5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp8a:*:*:*:*:*:*",
"matchCriteriaId": "E5F0F22B-EEA3-43B3-A600-53A471F32E5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp9:*:*:*:*:*:*",
"matchCriteriaId": "E89ACCE1-873B-4C4A-A64B-F344F96C2C6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp9a:*:*:*:*:*:*",
"matchCriteriaId": "1B5437F4-8DD4-4539-A40A-63C5E2C8CF48"
}
]
}
]
}
],
"references": [
{
"url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT",
"source": "cve@mitre.org"
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg24024075",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/2293",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}