Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.101107 |
Categoría: | Databases |
Título: | IBM Db2 Multiple Vulnerabilities (Linux) |
Resumen: | IBM Db2 is prone to multiple vulnerabilities. |
Descripción: | Summary: IBM Db2 is prone to multiple vulnerabilities. Vulnerability Insight: The flaws are due to: - An unspecified error when using DAS command may allow attackers to gain unauthorized access to a vulnerable database. - An unspecified error when processing malformed packets can be exploited to cause DB2JDS to crash creating a denial of service condition. - A memory leak in the Security component may be exploited via unspecified vectors related to private memory within the DB2 memory structure. Vulnerability Impact: Successful exploitation will allow attacker to cause a denial of service or compromise a vulnerable system. Affected Software/OS: IBM Db2 version 8.1 prior to Fixpack 18. Solution: Update to IBM Db2 Version 8.1 Fixpack 18. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-2858 AIX APAR: IZ35635 http://www-01.ibm.com/support/docview.wss?uid=swg1IZ35635 http://secunia.com/advisories/36313 Common Vulnerability Exposure (CVE) ID: CVE-2009-2859 AIX APAR: IZ34149 http://www-01.ibm.com/support/docview.wss?uid=swg1IZ34149 http://www.vupen.com/english/advisories/2009/2293 Common Vulnerability Exposure (CVE) ID: CVE-2009-2860 AIX APAR: IZ52433 http://www-01.ibm.com/support/docview.wss?uid=swg1IZ52433 |
Copyright | Copyright (C) 2009 Greenbone Networks GmbH |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |