CVE-2013-3475
https://notcve.org/view.php?id=CVE-2013-3475
Stack-based buffer overflow in db2aud in the Audit Facility in IBM DB2 and DB2 Connect 9.1, 9.5, 9.7, 9.8, and 10.1, as used in Smart Analytics System 7600 and other products, allows local users to gain privileges via unspecified vectors. Desbordamiento de búfer basado en pila en db2aud en Audit Facility de IBM DB2 y DB2 Connect v9.1, v9.5, v9.7, v9.8 y v10.1, como se utiliza en Smart System Analytics 7600 y otros productos, permite a usuarios locales conseguir privilegios a través de vectores no especificados. • http://secunia.com/advisories/52663 http://secunia.com/advisories/53704 http://www-01.ibm.com/support/docview.wss?uid=swg1IC92463 http://www-01.ibm.com/support/docview.wss?uid=swg1IC92495 http://www-01.ibm.com/support/docview.wss?uid=swg1IC92496 http://www-01.ibm.com/support/docview.wss?uid=swg1IC92498 http://www-01.ibm.com/support/docview.wss? • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-4826
https://notcve.org/view.php?id=CVE-2012-4826
Stack-based buffer overflow in the SQL/PSM (aka SQL Persistent Stored Module) Stored Procedure (SP) infrastructure in IBM DB2 9.1, 9.5, 9.7 before FP7, 9.8, and 10.1 might allow remote authenticated users to execute arbitrary code by debugging a stored procedure. Desbordamiento de búfer basado en pila en la infraestructura SQL/PSM (alias SQL Persistent Stored Module) Stored Procedure (SP) en IBM DB2 v9.1, v9.5, v9.7 antes de FP7, v9.8, y v10.1, podría permitir a usuarios remotos autenticados ejecutar código de su elección depurando un procedimiento almacenado. • http://osvdb.org/86414 http://www-01.ibm.com/support/docview.wss?uid=swg1IC86765 http://www-01.ibm.com/support/docview.wss?uid=swg1IC86781 http://www-01.ibm.com/support/docview.wss?uid=swg1IC86782 http://www-01.ibm.com/support/docview.wss?uid=swg1IC86783 http://www-01.ibm.com/support/docview.wss? • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-0713
https://notcve.org/view.php?id=CVE-2012-0713
Unspecified vulnerability in the XML feature in IBM DB2 9.7 before FP6 on Linux, UNIX, and Windows allows remote authenticated users to read arbitrary XML files via unknown vectors. Vulnerabilidad no especificada en la característica XML en IBM DB2 v9.7 anterior a FP6 en Linux, UNIX y Windows permite a usuarios remotos autenticados leer archivos XML arbitrarios a través de vectores desconocidos. • http://www-01.ibm.com/support/docview.wss?uid=swg1IC81462 http://www.securityfocus.com/bid/53873 •
CVE-2012-2197
https://notcve.org/view.php?id=CVE-2012-2197
Stack-based buffer overflow in the Java Stored Procedure infrastructure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote authenticated users to execute arbitrary code by leveraging certain CONNECT and EXECUTE privileges. Un desbordamiento de búfer basado en pila en la infraestructura de procedimiento almacenado de Java ('Java Stored Procedure infrastructure') en IBM DB2 v9.1 antes de FP12, v9.5 a FP9, v9.7 a FP6, v9.8 a FP5, y v10.1 permite a usuarios remotos autenticados ejecutar código de su elección aprovechándose de ciertos privilegios CONNECT y EXECUTE. • http://secunia.com/advisories/49919 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84555 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84752 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84753 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84754 http://www-01.ibm.com/support/docview.wss? • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-2194
https://notcve.org/view.php?id=CVE-2012-2194
Directory traversal vulnerability in the SQLJ.DB2_INSTALL_JAR stored procedure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote attackers to replace JAR files via unspecified vectors. Una vulnerabilidad de salto de directorio en el procedimiento almacenado SQLJ.DB2_INSTALL_JAR en IBM DB2 v9.1 antes de FP12, v9.5 hasta FP9, v9.7 hasta FP6, v9.8 hasta FP5 y v10.1 permite a atacantes remotos reemplazar los archivos JAR a través de vectores no especificados. • http://secunia.com/advisories/49919 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84019 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84711 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84714 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84715 http://www-01.ibm.com/support/docview.wss? • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •