Vulnerability Details : CVE-2012-2196
IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote attackers to read arbitrary XML files via the (1) GET_WRAP_CFG_C or (2) GET_WRAP_CFG_C2 stored procedure.
Vulnerability category: Information leak
Exploit prediction scoring system (EPSS) score for CVE-2012-2196
Probability of exploitation activity in the next 30 days: 0.68%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 77 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-2196
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
[email protected] |
CWE ids for CVE-2012-2196
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: [email protected] (Primary)
References for CVE-2012-2196
-
http://www-01.ibm.com/support/docview.wss?uid=swg1IC84748
-
http://www-01.ibm.com/support/docview.wss?uid=swg1IC84750
- http://www.securityfocus.com/bid/54487
- http://www-01.ibm.com/support/docview.wss?uid=swg21600837
- http://secunia.com/advisories/49919
-
http://www-01.ibm.com/support/docview.wss?uid=swg1IC84712
Vendor Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg1IC84614
-
http://www-01.ibm.com/support/docview.wss?uid=swg1IC84751
Vendor Advisory
Products affected by CVE-2012-2196
- cpe:2.3:a:ibm:db2:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.7.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.7.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.8:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.7.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.7.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.8.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.8.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1.0.2:a:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1.0.7:a:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1.0.3:a:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1.0.6:a:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1.0.4:a:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.1.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.5.0.2:a:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.5.0.6:a:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.5.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.5.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.5.0.3:a:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.5.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.5.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.5.0.4:a:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.5.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.5.0.3:b:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.5.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.7.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:9.8.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:db2:10.1:*:*:*:*:*:*:*