2024-12-08 03:06:42 +00:00

236 lines
8.0 KiB
JSON

{
"id": "CVE-2009-2858",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-08-19T17:30:01.187",
"lastModified": "2024-11-21T01:05:55.097",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory leak in the Security component in IBM DB2 8.1 before FP18 on Unix platforms allows attackers to cause a denial of service (memory consumption) via unspecified vectors, related to private memory within the DB2 memory structure."
},
{
"lang": "es",
"value": "Fuga de memoria en el componente de seguridad en IBM DB2 v8.1 anteriores a FP18 en plataformas Unix permite a atacantes producir una denegaci\u00f3n de servicio a trav\u00e9s de vectores sin especificar, relacionado con la memoria privada dentro de la estructura de memoria de DB2."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:fp17:*:*:*:*:*:*",
"versionEndIncluding": "8.1",
"matchCriteriaId": "00D40BBF-DAC1-4C6D-806B-B04C88F237F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp1:*:*:*:*:*:*",
"matchCriteriaId": "2418C923-2F94-4FAF-A9BD-D1C436308C3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp10:*:*:*:*:*:*",
"matchCriteriaId": "18D59696-A477-4397-BC14-4EF69DAFA262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp11:*:*:*:*:*:*",
"matchCriteriaId": "BBABCAC8-0E04-44FC-BF1A-88CACB28E644"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp12:*:*:*:*:*:*",
"matchCriteriaId": "AC318EEC-AFE5-4070-8711-B6560143CF9D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp13:*:*:*:*:*:*",
"matchCriteriaId": "5F02B3A6-F771-4F6A-A1E8-5E3EC1080272"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp14:*:*:*:*:*:*",
"matchCriteriaId": "DCF379F0-6D58-47A9-849E-C48D13496C87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp15:*:*:*:*:*:*",
"matchCriteriaId": "1F878C22-6294-4DFD-AFA4-1094644D15F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp17a:*:*:*:*:*:*",
"matchCriteriaId": "F2799A9D-1BAC-491A-B36B-A124C44D9EBB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp2:*:*:*:*:*:*",
"matchCriteriaId": "8AEBA7BD-E897-438E-8DD5-7AB5490AB931"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp3:*:*:*:*:*:*",
"matchCriteriaId": "BAA746B2-AC20-49D3-B8C6-655C268CB253"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp4:*:*:*:*:*:*",
"matchCriteriaId": "0FEC5C8E-9B3E-457F-8871-1EB172DBA7FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp4a:*:*:*:*:*:*",
"matchCriteriaId": "A8DA176E-1AD6-4524-9931-0165263D4E51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp5:*:*:*:*:*:*",
"matchCriteriaId": "AC4145E1-A805-4E64-904C-03B0B13BADBB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp6:*:*:*:*:*:*",
"matchCriteriaId": "281B0499-11FD-4B99-B402-B44B609469E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp6a:*:*:*:*:*:*",
"matchCriteriaId": "81AB9705-2397-4218-9529-E0DAF3196DAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp6b:*:*:*:*:*:*",
"matchCriteriaId": "2CB197BE-6C4B-4081-8643-3CC3D2FDDB28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp6c:*:*:*:*:*:*",
"matchCriteriaId": "53C13821-A069-41B8-AECD-8562E22F37D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp7:*:*:*:*:*:*",
"matchCriteriaId": "385C934A-4374-491C-8A61-EBCC5E72AF24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp7a:*:*:*:*:*:*",
"matchCriteriaId": "F7A4B9D8-D8FE-4204-8D09-1C69B9676F4A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp8:*:*:*:*:*:*",
"matchCriteriaId": "286E4585-57F7-428D-B9C2-63B33FA2BF5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp8a:*:*:*:*:*:*",
"matchCriteriaId": "E5F0F22B-EEA3-43B3-A600-53A471F32E5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp9:*:*:*:*:*:*",
"matchCriteriaId": "E89ACCE1-873B-4C4A-A64B-F344F96C2C6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:8.1:fp9a:*:*:*:*:*:*",
"matchCriteriaId": "1B5437F4-8DD4-4539-A40A-63C5E2C8CF48"
}
]
}
]
}
],
"references": [
{
"url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/36313",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ35635",
"source": "cve@mitre.org"
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg24024075",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/36313",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ35635",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg24024075",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}