fkie_cve-2006-4257
Vulnerability from fkie_nvd
Published
2006-08-21 20:04
Modified
2024-11-21 00:15
Severity ?
Summary
IBM DB2 Universal Database (UDB) before 8.1 FixPak 13 allows remote authenticated users to cause a denial of service (crash) by (1) sending the first ACCSEC command without an RDBNAM parameter during the CONNECT process, or (2) sending crafted SQLJRA packet, which results in a null dereference.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ibm | db2 | 8.0 | |
ibm | db2 | 8.0 | |
ibm | db2 | 8.0 | |
ibm | db2 | 8.1 | |
ibm | db2 | 8.1 | |
ibm | db2 | 8.1 | |
ibm | db2 | 8.1 | |
ibm | db2 | 8.1 | |
ibm | db2 | 8.1.4 | |
ibm | db2 | 8.1.4 | |
ibm | db2 | 8.1.4 | |
ibm | db2 | 8.1.4 | |
ibm | db2 | 8.1.4 | |
ibm | db2 | 8.1.5 | |
ibm | db2 | 8.1.5 | |
ibm | db2 | 8.1.5 | |
ibm | db2 | 8.1.5 | |
ibm | db2 | 8.1.5 | |
ibm | db2 | 8.1.6 | |
ibm | db2 | 8.1.6 | |
ibm | db2 | 8.1.6 | |
ibm | db2 | 8.1.6 | |
ibm | db2 | 8.1.6 | |
ibm | db2 | 8.1.6c | |
ibm | db2 | 8.1.6c | |
ibm | db2 | 8.1.6c | |
ibm | db2 | 8.1.6c | |
ibm | db2 | 8.1.6c | |
ibm | db2 | 8.1.7 | |
ibm | db2 | 8.1.7 | |
ibm | db2 | 8.1.7 | |
ibm | db2 | 8.1.7 | |
ibm | db2 | 8.1.7 | |
ibm | db2 | 8.1.7b | |
ibm | db2 | 8.1.7b | |
ibm | db2 | 8.1.7b | |
ibm | db2 | 8.1.7b | |
ibm | db2 | 8.1.7b | |
ibm | db2 | 8.1.8 | |
ibm | db2 | 8.1.8 | |
ibm | db2 | 8.1.8 | |
ibm | db2 | 8.1.8 | |
ibm | db2 | 8.1.8 | |
ibm | db2 | 8.1.8a | |
ibm | db2 | 8.1.8a | |
ibm | db2 | 8.1.8a | |
ibm | db2 | 8.1.8a | |
ibm | db2 | 8.1.8a | |
ibm | db2 | 8.1.9 | |
ibm | db2 | 8.1.9 | |
ibm | db2 | 8.1.9 | |
ibm | db2 | 8.1.9 | |
ibm | db2 | 8.1.9 | |
ibm | db2 | 8.1.9a | |
ibm | db2 | 8.1.9a | |
ibm | db2 | 8.1.9a | |
ibm | db2 | 8.1.9a | |
ibm | db2 | 8.1.9a | |
ibm | db2 | 8.2 | |
ibm | db2 | 8.10 | |
ibm | db2 | 8.10 | |
ibm | db2 | 8.10 | |
ibm | db2 | 8.12 | |
ibm | db2 | 8.12 | |
ibm | db2 | 8.12 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:db2:8.0:*:aix:*:*:*:*:*", "matchCriteriaId": "CFCC258E-BF48-4D05-805D-25F74A1BD4FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.0:*:linux:*:*:*:*:*", "matchCriteriaId": "C937B416-678E-49BF-90A9-271A00DAF35C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.0:*:os_390:*:*:*:*:*", "matchCriteriaId": "3D57D2F4-6A8D-47E6-ADB6-A1D6FFE464C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:*:aix:*:*:*:*:*", "matchCriteriaId": "0864138D-6D70-4D85-A623-570CF08FC8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "3E6D6AF7-1083-45B6-8EEF-1C80CC4479FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:*:linux:*:*:*:*:*", "matchCriteriaId": "0A847132-100A-4109-B890-803D297CB0C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:*:solaris:*:*:*:*:*", "matchCriteriaId": "98CA5DB1-AEB0-4F4E-A5CC-FC9F5929A29C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1:*:windows:*:*:*:*:*", "matchCriteriaId": "7AAB0F57-3E37-4604-842F-372A963CCDF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.4:*:aix:*:*:*:*:*", "matchCriteriaId": "E1A207FA-1E31-4E62-B0B5-EF86F4627692", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.4:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "C9321C42-CAF0-4079-9389-17B2E3AE34D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.4:*:linux:*:*:*:*:*", "matchCriteriaId": "70FDFE4D-769C-4C7A-BCC7-217E05E5AED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.4:*:solaris:*:*:*:*:*", "matchCriteriaId": "F0898B3F-D18E-45CF-9D82-CCBC820727EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.4:*:windows:*:*:*:*:*", "matchCriteriaId": "F441845B-9E1F-491C-A5D9-816F6649F00B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.5:*:aix:*:*:*:*:*", "matchCriteriaId": "DD4D9995-B739-4C5D-92C7-372B9AB2BD58", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.5:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "7FA427F3-DD47-4359-8514-F02C398A8E46", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.5:*:linux:*:*:*:*:*", "matchCriteriaId": "A220316D-6D0C-47A7-994E-1D8A2CF5D628", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.5:*:solaris:*:*:*:*:*", "matchCriteriaId": "1C64CAA9-5BE7-4600-AF7E-9CE480861BF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.5:*:windows:*:*:*:*:*", "matchCriteriaId": "E076BD5E-5A25-4EBA-BC8F-FDE8D63FA595", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.6:*:aix:*:*:*:*:*", "matchCriteriaId": "0861D4F3-46F1-4A9F-B2A9-4A6756E9706C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.6:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "CB16643D-7BD5-41F3-AA61-F6640EDE22CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.6:*:linux:*:*:*:*:*", "matchCriteriaId": "29EED40E-A3A2-4F25-8627-2FF60C94BC19", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.6:*:solaris:*:*:*:*:*", "matchCriteriaId": "E75FED7D-2B5C-4C7D-AF3A-956F2FF8C149", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.6:*:windows:*:*:*:*:*", "matchCriteriaId": "BE40BCCF-93BB-4B32-8E55-0BD9532E3BF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.6c:*:aix:*:*:*:*:*", "matchCriteriaId": "5E0C7B84-66C4-4FE5-9412-FBD5DBB4323E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.6c:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "46320B9E-3FA7-4AF6-80ED-7A89C2678F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.6c:*:linux:*:*:*:*:*", "matchCriteriaId": "32041E5A-2DF1-46FA-A520-FFD451AE30BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.6c:*:solaris:*:*:*:*:*", "matchCriteriaId": "43A1F69A-49B6-43E5-A0E2-2572EBBB49C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.6c:*:windows:*:*:*:*:*", "matchCriteriaId": "F05D503A-106D-4192-A1E4-BDB5535ACC4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.7:*:aix:*:*:*:*:*", "matchCriteriaId": "38F090EF-53EE-4F21-9B8B-C8C42AD4C121", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.7:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "828C5C06-4711-4C57-9657-3CAAAF76DCF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.7:*:linux:*:*:*:*:*", "matchCriteriaId": "BF84E6DF-D9E3-4835-BCE1-2B47DB9DC5E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.7:*:solaris:*:*:*:*:*", "matchCriteriaId": "A7C1ED00-7D98-4F8E-B6A8-C9C16B27196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.7:*:windows:*:*:*:*:*", "matchCriteriaId": "7757DA05-C0A8-49EC-99D4-99AE95CBB2D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.7b:*:aix:*:*:*:*:*", "matchCriteriaId": "3C334DEF-07A5-4377-85C1-D3623A0904FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.7b:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "9E1A0923-FCFB-4669-B3C7-7EC65B7CA288", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.7b:*:linux:*:*:*:*:*", "matchCriteriaId": "34F3CA5A-9FBF-4B35-851D-7A2D6FB0613F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.7b:*:solaris:*:*:*:*:*", "matchCriteriaId": "9CF93B79-4866-448C-A230-4C2F8AAB467B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.7b:*:windows:*:*:*:*:*", "matchCriteriaId": "6EFCAD6F-4741-41B9-AE3E-5F02B8DD90C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.8:*:aix:*:*:*:*:*", "matchCriteriaId": "E70C9CA6-890A-4E8D-A625-82538402D336", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.8:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "07F0C470-B9D9-4327-A918-FEAEC1BF9436", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.8:*:linux:*:*:*:*:*", "matchCriteriaId": "5D454393-D17F-48DB-84DA-05E61D8805F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.8:*:solaris:*:*:*:*:*", "matchCriteriaId": "61C20E8F-04F8-4609-BC49-C71A2C01739C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.8:*:windows:*:*:*:*:*", "matchCriteriaId": "4ADB7290-1954-4873-9B90-772704B2177C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.8a:*:aix:*:*:*:*:*", "matchCriteriaId": "2D5AB9D5-D732-4C6C-9BCC-6DBA3809780B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.8a:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "33A46387-BA75-4ECE-AFC0-EF69425E0940", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.8a:*:linux:*:*:*:*:*", "matchCriteriaId": "7EAD4BCC-88F8-4ED8-A5ED-4E5EFC66CDAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.8a:*:solaris:*:*:*:*:*", "matchCriteriaId": "4540F5C4-B859-4AFD-88ED-029700785D15", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.8a:*:windows:*:*:*:*:*", "matchCriteriaId": "6A224945-8A17-4DBD-BB14-8E8BD476A904", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.9:*:aix:*:*:*:*:*", "matchCriteriaId": "8944A5FC-6258-4740-9373-491F8C41DD35", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.9:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "C99162AE-739B-497B-94B2-7EEA79C5812D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.9:*:linux:*:*:*:*:*", "matchCriteriaId": "5D1B08DC-F52B-439B-827D-4BE4ECA78A55", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.9:*:solaris:*:*:*:*:*", "matchCriteriaId": "4313BEDA-BCC5-47E6-934B-58AE8DD21FD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.9:*:windows:*:*:*:*:*", "matchCriteriaId": "D3DE2356-73EB-47D4-BEEF-E9AB8B1FF0FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.9a:*:aix:*:*:*:*:*", "matchCriteriaId": "4C3AA6C4-7700-4637-8B75-ABED7D8993A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.9a:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "E9A95C89-E9CC-49A2-8395-F3D89774966D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.9a:*:linux:*:*:*:*:*", "matchCriteriaId": "B730265C-358D-4BBF-8B40-48D943114E3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.9a:*:solaris:*:*:*:*:*", "matchCriteriaId": "719F646C-3958-4469-9C17-430E394E8D70", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.1.9a:*:windows:*:*:*:*:*", "matchCriteriaId": "86D936F6-2DC0-4BC3-943E-A5C9F2319206", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.2:*:linux:*:*:*:*:*", "matchCriteriaId": "67C33265-E3BC-406B-9986-E977CDE768FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.10:*:linux:*:*:*:*:*", "matchCriteriaId": "7ED5600A-BD0C-4E48-A8B5-6833883A8981", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.10:*:solaris:*:*:*:*:*", "matchCriteriaId": "1CD16421-5F61-46EB-B23C-2267DA0B5FE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.10:*:windows:*:*:*:*:*", "matchCriteriaId": "F680EF69-C60C-482A-A301-E335EBB34217", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.12:*:linux:*:*:*:*:*", "matchCriteriaId": "4CC41143-ADD4-47D0-876A-5C3AB6E94CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.12:*:solaris:*:*:*:*:*", "matchCriteriaId": "00C357A5-DCAF-4F5C-9B83-144D0AB74F02", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.12:*:windows:*:*:*:*:*", "matchCriteriaId": "47D6DC83-FEBC-4C0B-A774-C55775BB2DF6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM DB2 Universal Database (UDB) before 8.1 FixPak 13 allows remote authenticated users to cause a denial of service (crash) by (1) sending the first ACCSEC command without an RDBNAM parameter during the CONNECT process, or (2) sending crafted SQLJRA packet, which results in a null dereference." }, { "lang": "es", "value": "IBM DB2 Universal Database (UDB) anterior a 8.1 FixPak 13 permite a atacantes autenticados remotamente provocar una denegaci\u00f3n de servicio (ca\u00edda) (1) enviando el primer comando ACCSEC sin un par\u00e1metro RDBNAM durante el proceso de conexi\u00f3n (CONNECT), o (2) enviando paquetes SQLJRA manipulados, lo cual resulta en una referencia a nulo." } ], "id": "CVE-2006-4257", "lastModified": "2024-11-21T00:15:30.563", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-08-21T20:04:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT" }, { "source": "cve@mitre.org", "url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21550" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg24013114" }, { "source": "cve@mitre.org", "url": "http://www.appsecinc.com/resources/alerts/db2/2006-09-05.shtml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/445298/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/454307/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19586" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21550" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg24013114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.appsecinc.com/resources/alerts/db2/2006-09-05.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/445298/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/454307/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3328" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.