Stack-based buffer overflow in IBM DB2 9.7 through FP9a, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP4 on Linux, UNIX, and Windows allows remote authenticated users to execute arbitrary code via a crafted ALTER MODULE statement.
| Version | Base score | Base severity | Vector |
|---|
| Hyperlink | Resource Type |
|---|
Stack-based buffer overflow in IBM DB2 9.7 through FP9a, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP4 on Linux, UNIX, and Windows allows remote authenticated users to execute arbitrary code via a crafted ALTER MODULE statement.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www-01.ibm.com/support/docview.wss?uid=swg21683296 | x_refsource_CONFIRM |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/94260 | vdb-entry x_refsource_XF |
| http://www-01.ibm.com/support/docview.wss?uid=swg1IT02593 | vendor-advisory x_refsource_AIXAPAR |
| http://secunia.com/advisories/58616 | third-party-advisory x_refsource_SECUNIA |
| http://www-01.ibm.com/support/docview.wss?uid=swg1IT02291 | vendor-advisory x_refsource_AIXAPAR |
| http://www.securityfocus.com/bid/69550 | vdb-entry x_refsource_BID |
| http://www-01.ibm.com/support/docview.wss?uid=swg1IT02594 | vendor-advisory x_refsource_AIXAPAR |
| http://www-01.ibm.com/support/docview.wss?uid=swg1IT02592 | vendor-advisory x_refsource_AIXAPAR |
| http://www-01.ibm.com/support/docview.wss?uid=swg21681631 | x_refsource_CONFIRM |
| http://secunia.com/advisories/60845 | third-party-advisory x_refsource_SECUNIA |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www-01.ibm.com/support/docview.wss?uid=swg21683296 | x_refsource_CONFIRM x_transferred |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/94260 | vdb-entry x_refsource_XF x_transferred |
| http://www-01.ibm.com/support/docview.wss?uid=swg1IT02593 | vendor-advisory x_refsource_AIXAPAR x_transferred |
| http://secunia.com/advisories/58616 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www-01.ibm.com/support/docview.wss?uid=swg1IT02291 | vendor-advisory x_refsource_AIXAPAR x_transferred |
| http://www.securityfocus.com/bid/69550 | vdb-entry x_refsource_BID x_transferred |
| http://www-01.ibm.com/support/docview.wss?uid=swg1IT02594 | vendor-advisory x_refsource_AIXAPAR x_transferred |
| http://www-01.ibm.com/support/docview.wss?uid=swg1IT02592 | vendor-advisory x_refsource_AIXAPAR x_transferred |
| http://www-01.ibm.com/support/docview.wss?uid=swg21681631 | x_refsource_CONFIRM x_transferred |
| http://secunia.com/advisories/60845 | third-party-advisory x_refsource_SECUNIA x_transferred |
Stack-based buffer overflow in IBM DB2 9.7 through FP9a, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP4 on Linux, UNIX, and Windows allows remote authenticated users to execute arbitrary code via a crafted ALTER MODULE statement.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 8.5 | HIGH | AV:N/AC:M/Au:S/C:C/I:C/A:C |