| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 8.2 | $0-$5k | 0.00 |
Summary
A vulnerability marked as problematic has been reported in IBM DB2 Universal Database 7.x/8.x on Windows. The impacted element is an unknown function. This manipulation causes memory corruption. This vulnerability is registered as CVE-2005-4863. Remote exploitation of the attack is possible. No exploit is available. It is suggested to install a patch to address this issue.
Details
A vulnerability classified as critical was found in IBM DB2 Universal Database 7.x/8.x on Windows (Database Software). Affected by this vulnerability is an unknown code. The manipulation with an unknown input leads to a memory corruption vulnerability. The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
Stack-based buffer overflow in db2fmp in IBM DB2 7.x and 8.1 allows local users to execute arbitrary code via a long parameter.
The bug was discovered 10/06/2004. The weakness was published 10/02/2004 by David Litchfield with IBM (Website). The advisory is shared at www-1.ibm.com. This vulnerability is known as CVE-2005-4863 since 10/06/2007. The attack can be launched remotely. The exploitation doesn't need any form of authentication. Neither technical details nor an exploit are publicly available.
The vulnerability scanner Nessus provides a plugin with the ID 15486 (IBM DB2 < 8 Fix Pack 7a Multiple Vulnerabilities), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Databases and running in the context r.
Applying a patch is able to eliminate this problem. The bugfix is ready for download at ibm.com. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 3277.
The vulnerability is also documented in the databases at X-Force (17615), Tenable (15486), SecurityFocus (BID 11397†), OSVDB (10518†) and Secunia (SA12733†). Additional details are provided at nextgenss.com. Similar entries are available at VDB-822, VDB-873, VDB-867 and VDB-866. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.ibm.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 8.6VulDB Meta Temp Score: 8.2
VulDB Base Score: 8.6
VulDB Temp Score: 8.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 15486
Nessus Name: IBM DB2 < 8 Fix Pack 7a Multiple Vulnerabilities
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Patch: ibm.com
TippingPoint: 🔍
Timeline
09/01/2004 🔍09/01/2004 🔍
10/02/2004 🔍
10/06/2004 🔍
10/06/2004 🔍
10/06/2004 🔍
10/07/2004 🔍
10/07/2004 🔍
10/17/2004 🔍
12/31/2005 🔍
10/06/2007 🔍
01/02/2008 🔍
06/29/2019 🔍
Sources
Vendor: ibm.comAdvisory: www-1.ibm.com
Researcher: David Litchfield
Organization: IBM
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2005-4863 (🔍)
GCVE (CVE): GCVE-0-2005-4863
GCVE (VulDB): GCVE-100-865
X-Force: 17615 - IBM DB2 DB2FMP buffer overflow, High Risk
SecurityFocus: 11397 - IBM DB2 DB2FMP Command String Buffer Overflow Vulnerability
Secunia: 12733 - DB2 Universal Database Multiple Vulnerabilities, Moderately Critical
OSVDB: 10518 - IBM DB2 Universal Database DB2FMP Command Local Overflow
SecurityTracker: 1011562
Vulnerability Center: 17242 - IBM DB2 7- 8.1 Stack-Based Buffer Overflow in db2fmp Allows Local Code Execution, Medium
Misc.: 🔍
See also: 🔍
Entry
Created: 10/07/2004 11:41Updated: 06/29/2019 14:12
Changes: 10/07/2004 11:41 (92), 06/29/2019 14:12 (6)
Complete: 🔍
Cache ID: 216:FBB:103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.