2024-12-08 03:06:42 +00:00

235 lines
6.8 KiB
JSON

{
"id": "CVE-2018-1922",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2019-03-11T22:29:00.500",
"lastModified": "2024-11-21T04:00:36.237",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 is affected by buffer overflow vulnerability that can potentially result in arbitrary code execution. IBM X-Force ID: 152858."
},
{
"lang": "es",
"value": "IBM DB2 para Linux, UNIX y WIndows (incluye DB2 Connect Server), en versiones 9.7, 10.1, 10.5 y 11.1, est\u00e1 afectado por una vulnerabilidad de desbordamiento de b\u00fafer que puede resultar en una ejecuci\u00f3n de c\u00f3digo arbitrario. IBM X-Force ID: 152858."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 4.6,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CE1C4DE6-EB32-4A31-9FAA-D8DA31D8CF05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2952EB24-A015-4EC7-85E3-88588D0AB15B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6E232F83-BE4C-4B3E-A5B1-53F9D95F0368"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0DC3F2DB-9AE2-4B11-A838-167E857D831D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CE1C4DE6-EB32-4A31-9FAA-D8DA31D8CF05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2952EB24-A015-4EC7-85E3-88588D0AB15B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6E232F83-BE4C-4B3E-A5B1-53F9D95F0368"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0DC3F2DB-9AE2-4B11-A838-167E857D831D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/107398",
"source": "psirt@us.ibm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/152858",
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10740413",
"source": "psirt@us.ibm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/107398",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/152858",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10740413",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}