CVE-2008-3959
Published Sep 11, 2008
Last updated 7 years ago
Overview
- Description
- IBM DB2 UDB 8.1 before FixPak 16, 8.2 before FixPak 9, and 9.1 before FixPak 4a allows remote attackers to cause a denial of service (instance crash) via a crafted SQLJRA packet within a CONNECT/ATTACH data stream that simulates a V7 client connect/attach request.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:db2:*:fp15:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "512B9F94-00CE-4479-B3EA-91D74097CB61", "versionEndIncluding": "8.1" }, { "criteria": "cpe:2.3:a:ibm:db2:*:fp8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FC6A358-2290-4E14-B4FE-05195992C05D", "versionEndIncluding": "8.2" }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:fp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2418C923-2F94-4FAF-A9BD-D1C436308C3D" }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:fp10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18D59696-A477-4397-BC14-4EF69DAFA262" }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:fp11:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBABCAC8-0E04-44FC-BF1A-88CACB28E644" }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:fp12:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC318EEC-AFE5-4070-8711-B6560143CF9D" }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:fp13:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F02B3A6-F771-4F6A-A1E8-5E3EC1080272" }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:fp14:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCF379F0-6D58-47A9-849E-C48D13496C87" }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:fp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AEBA7BD-E897-438E-8DD5-7AB5490AB931" }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:fp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAA746B2-AC20-49D3-B8C6-655C268CB253" }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:fp4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FEC5C8E-9B3E-457F-8871-1EB172DBA7FD" }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:fp5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC4145E1-A805-4E64-904C-03B0B13BADBB" }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:fp6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "281B0499-11FD-4B99-B402-B44B609469E3" }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:fp7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "385C934A-4374-491C-8A61-EBCC5E72AF24" }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:fp8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "286E4585-57F7-428D-B9C2-63B33FA2BF5F" }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:fp9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E89ACCE1-873B-4C4A-A64B-F344F96C2C6C" }, { "criteria": "cpe:2.3:a:ibm:db2:8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64D7ACC0-4CF4-4B60-902C-C47DFCD097A9" }, { "criteria": "cpe:2.3:a:ibm:db2:8.2:fp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55ABF9A3-7776-4C0B-A6CC-45955E42DA1B" }, { "criteria": "cpe:2.3:a:ibm:db2:8.2:fp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DF77950-22DE-4BA2-A10F-10953F6119E6" }, { "criteria": "cpe:2.3:a:ibm:db2:8.2:fp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57F66472-61EC-4467-ACF6-2893BF9E4050" }, { "criteria": "cpe:2.3:a:ibm:db2:8.2:fp4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "403EF6EC-9EEF-40F1-BA5C-F6211AADC9A2" }, { "criteria": "cpe:2.3:a:ibm:db2:8.2:fp5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CE8E119-58C7-4BF0-9C74-93F44E4FC732" }, { "criteria": "cpe:2.3:a:ibm:db2:8.2:fp6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F16D689-D091-47AA-96EC-6B419D4A6CD2" }, { "criteria": "cpe:2.3:a:ibm:db2:8.2:fp7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AAEFCEBE-4CBC-4301-BEC6-9D9C9C3E0539" } ], "operator": "OR" } ] } ]