Page 7 of 39 results (0.009 seconds)

CVSS: 10.0EPSS: 1%CPEs: 15EXPL: 0

Buffer overflow in the DAS server in IBM DB2 8 before FP17, 9.1 before FP5, and 9.5 before FP2 might allow attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors, a different vulnerability than CVE-2007-3676 and CVE-2008-3853. Desbordamiento de búfer en el servidor DAS en IBM DB2 v8 anterior a la FP17, v9.1 anterior a la FP5 y v9.5 anterior a FP2, podría permitir a atacantes ejecutar código de su elección o provocar una denegación de servicio (caída de aplicación) a través de vectores no especificados. Vulnerabilidad distinta de VE-2007-3676 y CVE-2008-3853. • ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT http://secunia.com/advisories/31787 http://www-01.ibm.com/support/docview.wss?uid=swg1IZ22004 http://www-01.ibm.com/support/docview.wss?uid=swg1IZ22188 http://www-01.ibm.com/support/docview.wss?uid=swg1IZ22190 http://www-01.ibm.com/support/docview.wss?uid=swg21318189 http://www.securityfocus.com/bid/35408 https://exchange.xforce.ibmcloud.com/vulnerabilities/51108 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.0EPSS: 0%CPEs: 15EXPL: 0

IBM DB2 8 before FP17, 9.1 before FP5, and 9.5 before FP2 provides an INSTALL_JAR (aka sqlj.install_jar) procedure, which allows remote authenticated users to create or overwrite arbitrary files via unspecified calls. IBM DB2 v8 anterior a FP17, v9.1 anterior a FP5 y v9.5 anterior a FP2, ofrece un procedimiento INSTALL_JAR (también conocido como sqlj.install_jar), lo que permite a usuarios autenticados remotamente crear o sobrescribir ficheros de su elección a través de llamadas sin especificar. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM DB2. Authentication is required in that a user must have the ability to connect to the database. The specific flaw exists within the install_jar procedure. The install_jar procedure contains a directory traversal vulnerability that will allow the attacker to upload a Jar file to a directory outside of the intended "\function\jar\Name_of_logged_user\" directory. • ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT http://osvdb.org/48147 http://secunia.com/advisories/31787 http://www-01.ibm.com/support/docview.wss?uid=swg1IZ21983 http://www-01.ibm.com/support/docview.wss?uid=swg1IZ22142 http://www-01.ibm.com/support/docview.wss?uid=swg1IZ22143 http://www-01.ibm.com/support/docview.wss?uid=swg21318189 http://www.securityfocus.com/bid/35409 https://exchange.xforce.ibmcloud.com/vulnerabilities/51105 • CWE-16: Configuration •

CVSS: 2.6EPSS: 0%CPEs: 18EXPL: 0

The Common Code Infrastructure component in IBM DB2 8 before FP17, 9.1 before FP7, and 9.5 before FP4, when LDAP security (aka IBMLDAPauthserver) and anonymous bind are enabled, allows remote attackers to bypass password authentication and establish a database connection via unspecified vectors. El componente Code Infrastructure en IBM DB2 v8 anterior a FP17 v9.1, anterior a FP7, y v9.5 anterior a FP4, cuando están activadas la seguridad LDAP (aka IBMLDAPauthserver) y las vinculaciones (bind) anónimas, permite a atacantes remotos evitar la autenticación mediante contraseña y establecer una conexión con la base de datos a través de vectores no especificados. • ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT http://secunia.com/advisories/31787 http://secunia.com/advisories/35235 http://securitytracker.com/id?1022319 http://www-01.ibm.com/support/docview.wss?uid=swg1JR32268 http://www-01.ibm.com/support/docview.wss?uid=swg1JR32272 http://www-01.ibm.com/support/docview.wss?uid=swg1JR32273 http://www-01.ibm.com/support/docview.wss? • CWE-287: Improper Authentication •

CVSS: 10.0EPSS: 1%CPEs: 34EXPL: 0

The Native Managed Provider for .NET component in IBM DB2 8 before FP17, 9.1 before FP6, and 9.5 before FP2, when a definer cannot maintain objects, preserves views and triggers without marking them inoperative or dropping them, which has unknown impact and attack vectors. El componete Native Managed Provider para .NET en IBM DB2 v8 anterior a FP17, v9.1 anteior a FP6, y v9.5 anterior a FP2, cuando un "definer" no puede mantener objetos, conserva las vistas (Views) y los disparadores (triggers) sin señalarlos como desactivados/no operativos para su ejecución, lo que tiene un impacto y vectores de ataque desconocidos. • ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v91/APARLIST.TXT http://secunia.com/advisories/31787 http://secunia.com/advisories/32368 http://www-01.ibm.com/support/docview.wss?uid=swg1IZ22287 http://www-01.ibm.com/support/docview.wss?uid=swg1IZ22306 http://www-01.ibm.com/support/docview.wss?uid=swg1IZ22307 http://www-01.ibm.com/support/docview.wss?uid=swg27013892 http://www.vupen.com/english/advisories/2008/2893 https://exchange.xforce.ibmcloud&# •

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

The SORT/LIST SERVICES component in IBM DB2 9.1 before FP6 and 9.5 before FP2 writes sensitive information to the trace output, which allows attackers to obtain sensitive information by reading "PASSWORD-RELATED CONNECTION STRING KEYWORD VALUES." El componente SORT/LIST SERVICES en IBM DB2 v9.1 anterior a FP6 y v9.5 anterior a FP2 escribe información sensible en la salida del trazado (trace), lo que permite a atacantes obtener información sensible mediante la lectura de "PASSWORD-RELATED CONNECTION STRING KEYWORD VALUES." • ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v91/APARLIST.TXT http://secunia.com/advisories/32368 http://www-01.ibm.com/support/docview.wss?uid=swg1IZ23915 http://www-01.ibm.com/support/docview.wss?uid=swg1IZ28489 http://www-01.ibm.com/support/docview.wss?uid=swg27013892 http://www.vupen.com/english/advisories/2008/2893 https://exchange.xforce.ibmcloud.com/vulnerabilities/46022 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •