CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
8.2 | $0-$5k | 0.00 |
A vulnerability classified as critical was found in IBM DB2 Universal Database 7.x/8.x on Windows (Database Software). Affected by this vulnerability is an unknown code. The manipulation with an unknown input leads to a memory corruption vulnerability. The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
Stack-based buffer overflow in db2fmp in IBM DB2 7.x and 8.1 allows local users to execute arbitrary code via a long parameter.
The bug was discovered 10/06/2004. The weakness was published 10/02/2004 by David Litchfield with IBM (Website). The advisory is shared at www-1.ibm.com. This vulnerability is known as CVE-2005-4863 since 10/06/2007. The attack can be launched remotely. The exploitation doesn't need any form of authentication. Neither technical details nor an exploit are publicly available.
The vulnerability scanner Nessus provides a plugin with the ID 15486 (IBM DB2 < 8 Fix Pack 7a Multiple Vulnerabilities), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Databases and running in the context r.
Applying a patch is able to eliminate this problem. The bugfix is ready for download at ibm.com. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 3277.
The vulnerability is also documented in the databases at X-Force (17615) and Tenable (15486). Additional details are provided at nextgenss.com. Similar entries are available at 822, 873, 867 and 866.
Product
Type
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 8.6VulDB Meta Temp Score: 8.2
VulDB Base Score: 8.6
VulDB Temp Score: 8.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
ATT&CK: Unknown
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 15486
Nessus Name: IBM DB2 < 8 Fix Pack 7a Multiple Vulnerabilities
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Patch: ibm.com
TippingPoint: 🔍
Timeline
09/01/2004 🔍09/01/2004 🔍
10/02/2004 🔍
10/06/2004 🔍
10/06/2004 🔍
10/06/2004 🔍
10/07/2004 🔍
10/07/2004 🔍
10/17/2004 🔍
12/31/2005 🔍
10/06/2007 🔍
01/02/2008 🔍
06/29/2019 🔍
Sources
Vendor: ibm.comAdvisory: www-1.ibm.com
Researcher: David Litchfield
Organization: IBM
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2005-4863 (🔍)
X-Force: 17615 - IBM DB2 DB2FMP buffer overflow, High Risk
SecurityTracker: 1011562
Vulnerability Center: 17242 - IBM DB2 7- 8.1 Stack-Based Buffer Overflow in db2fmp Allows Local Code Execution, Medium
SecurityFocus: 11397 - IBM DB2 DB2FMP Command String Buffer Overflow Vulnerability
Secunia: 12733 - DB2 Universal Database Multiple Vulnerabilities, Moderately Critical
OSVDB: 10518 - IBM DB2 Universal Database DB2FMP Command Local Overflow
Misc.: 🔍
See also: 🔍
Entry
Created: 10/07/2004 11:41Updated: 06/29/2019 14:12
Changes: 10/07/2004 11:41 (92), 06/29/2019 14:12 (6)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.