mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
180 lines
6.3 KiB
JSON
180 lines
6.3 KiB
JSON
{
|
|
"id": "CVE-2008-3960",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-09-11T01:13:47.570",
|
|
"lastModified": "2017-08-08T01:32:18.060",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in the JDBC Applet Server Service (aka db2jds) in IBM DB2 UDB 8 before Fixpak 17 allows remote attackers to cause a denial of service (service crash) via \"malicious packets.\""
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad sin especificar en el JDBC Applet Server Service (tambi\u00e9n conocido como db2jds) en IBM DB2 UDB 8 anterior al fixpack 17, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de servicio) a trav\u00e9s de \"paquetes maliciosos\"."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:*:fp16:*:*:*:*:*:*",
|
|
"versionEndIncluding": "8.2",
|
|
"matchCriteriaId": "CD142750-345A-4494-AD18-6066ACE7FD6F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2A1C6146-5EE5-4CD0-B6AC-3F41937C2FDD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.2:fp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "84FCC3B8-58C0-4739-A184-FE3D5171E6D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.2:fp10:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1261651A-8849-40A2-9E1C-E40F0033E6E4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.2:fp11:*:*:*:*:*:*",
|
|
"matchCriteriaId": "62B91891-59A3-4F3C-A0AB-196CCEA72643"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.2:fp12:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F4D3EC1B-B162-4FCC-B573-E45917F5D51A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.2:fp13:*:*:*:*:*:*",
|
|
"matchCriteriaId": "770BC7B2-6539-4C38-B246-32997A0D932C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.2:fp14:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4381E4E3-1E56-45E7-BF66-001DA1CFE18B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.2:fp15:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F3FB2953-6048-4C98-AC6A-272DCF7BEC31"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.2:fp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F0C9DEFD-F626-43B4-84E8-665CCED9BBEC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.2:fp3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B4784B3C-FE9A-4D24-8C54-5733B775A36E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.2:fp4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE9F3357-AF23-4DE5-A026-862A08522137"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.2:fp5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04D3F6B0-AF46-44F0-BA93-4154C84E23C1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.2:fp6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "62FF3DAA-5693-438C-89EB-1DF6765DB66C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.2:fp7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7B0A924-F4E1-4F82-9FCC-12EDBC76867C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.2:fp8:*:*:*:*:*:*",
|
|
"matchCriteriaId": "925077BB-0D08-4655-805E-F685DAE049F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:8.2:fp9:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A77736D2-8351-405D-88F7-14AE37AA1AA1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21318189",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR29274",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/31058",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1020826",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44984",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |