fkie_cve-2008-3852
Vulnerability from fkie_nvd
Published
2008-08-28 17:41
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the CLR stored procedure deployment from IBM Database Add-Ins for Visual Studio in the Visual Studio Net component in IBM DB2 9.1 before Fixpak 5 and 9.5 before Fixpak 2 allows remote authenticated users to execute arbitrary code via unknown vectors.
References
cve@mitre.orghttp://secunia.com/advisories/30558Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/31635Vendor Advisory
cve@mitre.orghttp://www-1.ibm.com/support/docview.wss?uid=swg1JR28431Vendor Advisory
cve@mitre.orghttp://www-1.ibm.com/support/docview.wss?uid=swg1JR28432Vendor Advisory
cve@mitre.orghttp://www-1.ibm.com/support/docview.wss?uid=swg21255607
cve@mitre.orghttp://www-1.ibm.com/support/docview.wss?uid=swg21293566
cve@mitre.orghttp://www.securityfocus.com/archive/1/496405/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/29601
cve@mitre.orghttp://www.securitytracker.com/id?1020761
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/1769Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2445Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/42927
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/44697
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30558Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31635Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?uid=swg1JR28431Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?uid=swg1JR28432Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?uid=swg21255607
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?uid=swg21293566
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/496405/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/29601
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020761
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1769Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2445Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/42927
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/44697



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:fp4a:aix:*:*:*:*:*",
              "matchCriteriaId": "331365ED-6901-41B1-8CAB-BD4924348983",
              "versionEndIncluding": "9.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:fp4a:hp-ux:*:*:*:*:*",
              "matchCriteriaId": "2973E5EC-D98D-4229-82DE-38D2B2B10FE3",
              "versionEndIncluding": "9.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:fp4a:linux:*:*:*:*:*",
              "matchCriteriaId": "FCBE6932-DF7C-4A07-94AE-A1B962A26201",
              "versionEndIncluding": "9.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:fp4a:solaris:*:*:*:*:*",
              "matchCriteriaId": "A1C99EB8-D889-4322-AEBD-941575E26B66",
              "versionEndIncluding": "9.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:fp4a:windows:*:*:*:*:*",
              "matchCriteriaId": "20167E27-8448-4747-90CA-112BF36664EC",
              "versionEndIncluding": "9.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:fp1:aix:*:*:*:*:*",
              "matchCriteriaId": "F1FC5B15-E438-444B-9CB7-8B33DE42AA10",
              "versionEndIncluding": "9.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:fp1:hp-ux:*:*:*:*:*",
              "matchCriteriaId": "08DC6612-16D7-4EEE-8010-E69E2ADBC816",
              "versionEndIncluding": "9.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:fp1:linux:*:*:*:*:*",
              "matchCriteriaId": "0F5E070A-9B0C-43C7-ADF4-5C2A12E77E99",
              "versionEndIncluding": "9.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:fp1:solaris:*:*:*:*:*",
              "matchCriteriaId": "3F0DC286-6602-457A-A150-453A8F15F722",
              "versionEndIncluding": "9.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:fp1:windows:*:*:*:*:*",
              "matchCriteriaId": "C19FCA98-00D1-4529-B07C-CF07E9F2EB12",
              "versionEndIncluding": "9.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:*:aix:*:*:*:*:*",
              "matchCriteriaId": "0D925911-6225-4B31-9C19-EF40360A9FB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:*:hp-ux:*:*:*:*:*",
              "matchCriteriaId": "A96437C6-D2C6-46BC-BC2D-078F6131E8E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "806CC0EE-9779-4676-A1FB-13878BAE42F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "C31FA827-1D6D-471A-8246-D39AF6AD0F83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:*:windows:*:*:*:*:*",
              "matchCriteriaId": "9446F75C-BE15-4DAE-9B96-E80F0EF24C0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:aix:*:*:*:*:*",
              "matchCriteriaId": "640F9988-7F33-4440-AB63-2743237BF2B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:hp-ux:*:*:*:*:*",
              "matchCriteriaId": "C6F52E0B-24A2-4942-9256-ADBBEE3C1BE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:linux:*:*:*:*:*",
              "matchCriteriaId": "627E56A7-98F1-4A94-9F76-4C6A9365616B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:solaris:*:*:*:*:*",
              "matchCriteriaId": "9DBCE5C1-CE78-4DEA-A6E7-35B2525052E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:windows:*:*:*:*:*",
              "matchCriteriaId": "CC92F759-749C-4E6A-83B3-C8ADB333054F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp3:aix:*:*:*:*:*",
              "matchCriteriaId": "30FD4DEA-CB8C-4E90-BE9E-B5C6225371A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp3:hp-ux:*:*:*:*:*",
              "matchCriteriaId": "24FE6316-E7FB-474B-B61B-38F72D6EE632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp3:linux:*:*:*:*:*",
              "matchCriteriaId": "45610195-E2DF-480B-898B-32EE8707D3E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp3:solaris:*:*:*:*:*",
              "matchCriteriaId": "D16FC5E6-87A6-4594-8E1F-8DEBA7A7326B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp3:windows:*:*:*:*:*",
              "matchCriteriaId": "F1503B4A-3C40-45E4-9C2F-347CDF419752",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:aix:*:*:*:*:*",
              "matchCriteriaId": "3F54309A-BA0E-447A-A115-DDBC20F6B2FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:hp-ux:*:*:*:*:*",
              "matchCriteriaId": "55F55D9D-3016-4AB1-84B3-20FEE3CD0A98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:linux:*:*:*:*:*",
              "matchCriteriaId": "C518666C-29DE-45C0-A68D-74B5E2CEBBBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:solaris:*:*:*:*:*",
              "matchCriteriaId": "C9C156A0-A869-4D16-955D-EC9A6696260C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:windows:*:*:*:*:*",
              "matchCriteriaId": "A3BD177C-6CF6-463D-8999-830DA1BF3E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.5:*:aix:*:*:*:*:*",
              "matchCriteriaId": "55D8F159-5A2D-4CB6-A7B9-7DCF8A9B82C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.5:*:hp-ux:*:*:*:*:*",
              "matchCriteriaId": "F7E8AA7B-4E40-41B9-8940-95B5F00E11DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.5:*:linux:*:*:*:*:*",
              "matchCriteriaId": "C91A9870-C75D-4B49-B1F5-E9CF054D3CA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.5:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "B7C7E16D-AC11-4FC0-9534-799926E525EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:db2_universal_database:9.5:*:windows:*:*:*:*:*",
              "matchCriteriaId": "C1B953D1-0B8F-4C6F-8485-E5E942593015",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the CLR stored procedure deployment from IBM Database Add-Ins for Visual Studio in the Visual Studio Net component in IBM DB2 9.1 before Fixpak 5 and 9.5 before Fixpak 2 allows remote authenticated users to execute arbitrary code via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en la implementaci\u00f3n del procedimiento almacenado CLR de Database Add-Ins de IBM para Visual Studio en el componente Visual Studio Net en DB2 de IBM versi\u00f3n 9.1 anterior a Fixpak 5 y versi\u00f3n 9.5 anterior a Fixpak 2,  permite a los usuarios autenticados remotos ejecutar c\u00f3digo arbitrario por medio de vectores desconocidos."
    }
  ],
  "id": "CVE-2008-3852",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-08-28T17:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30558"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31635"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR28431"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR28432"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21293566"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/496405/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/29601"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1020761"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/1769"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2445"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42927"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44697"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30558"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31635"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR28431"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR28432"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21293566"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/496405/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/29601"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020761"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/1769"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2445"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42927"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44697"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        },
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…