Vulnerability Details : CVE-2008-1966
Multiple buffer overflows in the JAR file administration routines in the BSU JAVA subcomponent in IBM DB2 8 before FP16, 9.1 before FP4a, and 9.5 before FP1 allow remote authenticated users to cause a denial of service (instance crash) via a call to the (1) RECOVERJAR or (2) REMOVE_JAR procedure with a crafted parameter, related to (a) sqlj.install_jar and (b) sqlj.replace_jar.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2008-1966
Probability of exploitation activity in the next 30 days: 1.80%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 87 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-1966
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
[email protected] |
CWE ids for CVE-2008-1966
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: [email protected] (Primary)
References for CVE-2008-1966
-
http://www.securityfocus.com/archive/1/491071/100/0/threaded
-
http://www-1.ibm.com/support/docview.wss?uid=swg1IZ15496
- http://www.securityfocus.com/bid/29601
- http://www-1.ibm.com/support/docview.wss?uid=swg21255607
-
http://www.appsecinc.com/resources/alerts/db2/2008-04.shtml
-
http://www.securityfocus.com/bid/28835
-
http://www-1.ibm.com/support/docview.wss?uid=swg1IZ08945
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41955
-
http://www-1.ibm.com/support/docview.wss?uid=swg1IZ08512
Products affected by CVE-2008-1966
- cpe:2.3:a:ibm:db2:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp8:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp13:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1:fp1:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp9:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp14:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1:fp2:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1:fp2a:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1:fp3:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1:fp3a:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1:fp4:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp4a:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp5:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp7b:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp1:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp6b:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp6c:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp9a:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp10:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp2:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp3:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp4:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp7:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp7a:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp11:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp12:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp6:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp6a:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp8a:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:8.0:fp15:*:*:*:*:*:*