Vulnerability Details : CVE-2009-3691
Multiple integer overflows in setnet32.exe 3.50.0.13752 in IBM Informix Client SDK 3.0 and 3.50 and Informix Connect Runtime 3.x allow remote attackers to execute arbitrary code via a .nfx file with a crafted (1) HostSize, and possibly (2) ProtoSize and (3) ServerSize, field that triggers a stack-based buffer overflow involving a crafted HostList field. NOTE: some of these details are obtained from third party information.
Vulnerability category: OverflowExecute code
Products affected by CVE-2009-3691
- cpe:2.3:a:ibm:informix_client_sdk:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:informix_client_sdk:3.50:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:informix_connect_runtime:3.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-3691
91.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-3691
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2009-3691
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-3691
Jump to