mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
225 lines
7.6 KiB
JSON
225 lines
7.6 KiB
JSON
{
|
|
"id": "CVE-2008-3853",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-08-28T17:41:00.000",
|
|
"lastModified": "2024-11-21T00:50:16.680",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Buffer overflow in the DAS server program in the Core DAS function component in IBM DB2 9.1 before FP4a and 9.5 before FP1 allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via unspecified vectors. NOTE: this might be related to CVE-2007-3676."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Desbordamiento de b\u00fafer en el programa DAS server en el componente de la funci\u00f3n Core DAS en IBM DB2 9.1 antes del Fixpak 4a permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) mediante vectores no especificados. NOTA: esto podr\u00eda estar relacionado con CVE-2008-0698."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"baseScore": 9.3,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:*:aix:*:*:*:*:*",
|
|
"matchCriteriaId": "0D925911-6225-4B31-9C19-EF40360A9FB7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "1961E7E9-35A4-4721-A081-E08D88FC1F42"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "806CC0EE-9779-4676-A1FB-13878BAE42F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "C31FA827-1D6D-471A-8246-D39AF6AD0F83"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:aix:*:*:*:*:*",
|
|
"matchCriteriaId": "640F9988-7F33-4440-AB63-2743237BF2B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:hp-ux:*:*:*:*:*",
|
|
"matchCriteriaId": "C6F52E0B-24A2-4942-9256-ADBBEE3C1BE6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "627E56A7-98F1-4A94-9F76-4C6A9365616B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "9DBCE5C1-CE78-4DEA-A6E7-35B2525052E9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp3:aix:*:*:*:*:*",
|
|
"matchCriteriaId": "30FD4DEA-CB8C-4E90-BE9E-B5C6225371A1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp3:hp-ux:*:*:*:*:*",
|
|
"matchCriteriaId": "24FE6316-E7FB-474B-B61B-38F72D6EE632"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp3:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "45610195-E2DF-480B-898B-32EE8707D3E7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp3:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "D16FC5E6-87A6-4594-8E1F-8DEBA7A7326B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:aix:*:*:*:*:*",
|
|
"matchCriteriaId": "3F54309A-BA0E-447A-A115-DDBC20F6B2FC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:hp-ux:*:*:*:*:*",
|
|
"matchCriteriaId": "55F55D9D-3016-4AB1-84B3-20FEE3CD0A98"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "C518666C-29DE-45C0-A68D-74B5E2CEBBBB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "C9C156A0-A869-4D16-955D-EC9A6696260C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/29784",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ12406",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ12379",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/29601",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45141",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/29784",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ12406",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ12379",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/29601",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45141",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |