Summary
The host is running IBM DB2 and is prone to denial of service and security bypass vulnerabilities.
Impact
Successful exploitation allows remote users to cause denial of service, disclose sensitive information and bypass security restrictions.
Impact Level: Application
Solution
Upgrade to IBM DB2 version 9.5 FP8 or later,
For updates refer to http://www-01.ibm.com/support/docview.wss?uid=swg21588098
For IBM DB2 version 9.7, No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
The flaws are due to an,
- Improper checks on variables, An attacker could exploit this vulnerability using a specially crafted SQL statement to bypass table restrictions and obtain sensitive information.
- Error in the XML feature allows remote authenticated users to cause a denial of service by calling the XMLPARSE function with a crafted string expression.
Affected
IBM DB2 version 9.5 before FP9 and IBM DB2 version 9.7 before FP5
References
Severity
Classification
-
CVE CVE-2012-0709, CVE-2012-0712 -
CVSS Base Score: 4.0
AV:N/AC:L/Au:S/C:N/I:N/A:P
Related Vulnerabilities
- IBM DB2 'DT_RPATH' Insecure Library Loading Code Execution Vulnerabilities
- Oracle MySQL Multiple Unspecified vulnerabilities-02 Feb15 (Windows)
- IBM DB2 REPEAT Buffer Overflow and TLS Renegotiation Vulnerabilities (Win)
- Oracle MySQL Multiple Unspecified vulnerabilities - 04 May14 (Windows)
- Oracle MySQL Server Component 'Replication' Unspecified vulnerability Oct-2013 (Windows)