Page 6 of 26 results (0.012 seconds)

CVSS: 10.0EPSS: 24%CPEs: 1EXPL: 0

Multiple buffer overflows in the DB2 JDBC Applet Server (DB2JDS) service in IBM DB2 9.x and earlier allow remote attackers to (1) execute arbitrary code via a crafted packet to the DB2JDS service on tcp/6789; and cause a denial of service via (2) an invalid LANG parameter or (2) a long packet that generates a "MemTree overflow." Múltiples desbordamientos de búfer en el servicio DB2 JDBC Applet Server (DB2JDS) en IBM DB2 versión 9.x y anteriores, permiten que los atacantes remotos (1) ejecuten un código arbitrario por medio de un paquete creado para el servicio DB2JDS en tcp/6789; y causa una denegación de servicio por medio de (2) un parámetro LANG no válido o (2) un paquete largo que genera un "MemTree overflow." The most severe of these vulnerabilities allows remote attackers to execute arbitrary code on vulnerable installations of IBM DB2 Universal Database. Authentication is not required to exploit these vulnerabilities. The first flaw exists in the DB2JDS service listening on TCP port 6789. A specially crafted packet is improperly processed by an internal sprintf() call resulting in a stack overflow which can be leveraged to execute arbitrary code. Additionally, two DoS condition vulnerabilities were discovered. • http://osvdb.org/40973 http://osvdb.org/40975 http://secunia.com/advisories/25148 http://www-1.ibm.com/support/search.wss?rs=0&q=IY97750&apar=only http://www.securityfocus.com/archive/1/482024/100/0/threaded http://www.securityfocus.com/bid/23890 http://www.securityfocus.com/bid/26010 http://www.securitytracker.com/id?1018029 http://www.securitytracker.com/id?1018801 http://www.vupen.com/english/advisories/2007/1707 http://www.zerodayinitiative.com/advisories/ZDI • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •