Vulnerability Name:
CVE-2008-1998 (CCN-41960)
Assigned:
2008-04-18
Published:
2008-04-18
Updated:
2018-10-31
Summary:
The NNSTAT (aka SYSPROC.NNSTAT) procedure in IBM DB2 8 before FP16, 9.1 before FP4a, and 9.5 before FP1 on Windows allows remote authenticated users to overwrite arbitrary files via the log file parameter.
CVSS v3 Severity:
3.5 Low
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
Required
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Low
Availibility (A):
None
CVSS v2 Severity:
8.5 High
(CVSS v2 Vector:
AV:N/AC:M/Au:S/C:C/I:C/A:C
)
6.3 Medium
(Temporal CVSS v2 Vector:
AV:N/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Authentication (Au):
Single_Instance
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
4.0 Medium
(CCN CVSS v2 Vector:
AV:N/AC:L/Au:S/C:N/I:P/A:N
)
3.0 Low
(CCN Temporal CVSS v2 Vector:
AV:N/AC:L/Au:S/C:N/I:P/A:N/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Athentication (Au):
Single_Instance
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Partial
Availibility (A):
None
Vulnerability Type:
CWE-264
Vulnerability Consequences:
File Manipulation
References:
Source: CCN
Type: BugTraq Mailing List, Fri Apr 18 2008 - 05:22:46 CDT
Team SHATTER Security Advisory: IBM DB2 UDB Arbitrary file overwrite in SYSPROC.NNSTAT procedure
Source: MITRE
Type: CNA
CVE-2008-1998
Source: CCN
Type: SA29022
IBM DB2 Multiple Vulnerabilities
Source: SECUNIA
Type: Third Party Advisory
29022
Source: CCN
Type: SA29784
IBM DB2 Multiple Vulnerabilities
Source: SECUNIA
Type: Third Party Advisory
29784
Source: SREASON
Type: Third Party Advisory
3840
Source: CCN
Type: IBM Technote (FAQ) 1255572
DB2 Version 9.1 fix packs and clients
Source: CCN
Type: IBM Technote (FAQ) 1256235
DB2 UDB Version 8 FixPaks and clients
Source: CCN
Type: IBM Technote (FAQ) 1287889
DB2 Version 9.5 fix packs and clients
Source: AIXAPAR
Type: Vendor Advisory
IZ06976
Source: AIXAPAR
Type: Vendor Advisory
IZ06977
Source: AIXAPAR
Type: Vendor Advisory
IZ10776
Source: MISC
Type: Third Party Advisory
http://www.appsecinc.com/resources/alerts/db2/2008-03.shtml
Source: CCN
Type: OSVDB ID: 41796
IBM DB2 Universal Database SYSPROC.NNSTAT log File Parameter Arbitrary File Overwrite
Source: BUGTRAQ
Type: Third Party Advisory, VDB Entry
20080418 Team SHATTER Security Advisory: IBM DB2 UDB Arbitrary file overwrite in SYSPROC.NNSTAT procedure
Source: BID
Type: Third Party Advisory, VDB Entry
28836
Source: CCN
Type: BID-28836
IBM DB2 'NNSTAT' Procedure Arbitrary File Overwrite Vulnerability
Source: XF
Type: Third Party Advisory, VDB Entry
ibm-db2-nnstat-file-overwrite(41960)
Source: XF
Type: UNKNOWN
ibm-db2-nnstat-file-overwrite(41960)
Vulnerable Configuration:
Configuration 1
:
cpe:/o:microsoft:windows:*:*:*:*:*:*:*:*
AND
cpe:/a:ibm:db2:8.0:fp1:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp10:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp11:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp12:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp13:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp14:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp15:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp2:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp3:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp4:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp5:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp6:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp6a:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp6b:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp6c:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp7:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp7a:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp7b:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp8:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp8a:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp9:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:8.0:fp9a:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:9.1:fp1:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:9.1:fp2:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:9.1:fp3:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:9.1:fp3a:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:9.1:fp4:*:*:*:*:*:*
OR
cpe:/a:ibm:db2:9.5:-:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/a:ibm:db2_universal_database:8.0:*:*:*:*:*:*:*
OR
cpe:/a:ibm:db2_universal_database:9.1:*:*:*:*:*:*:*
OR
cpe:/a:ibm:db2_universal_database:9.5:*:*:*:*:*:*:*
OR
cpe:/a:ibm:db2_universal_database:9.1:fp4:*:*:*:*:*:*
OR
cpe:/a:ibm:db2_universal_database:9.1:fp3:aix:*:*:*:*:*
OR
cpe:/a:ibm:db2_universal_database:9.1::fp2:*:*:*:*:*
OR
cpe:/a:ibm:db2_universal_database:8.0:fp14:*:*:*:*:*:*
OR
cpe:/a:ibm:db2_universal_database:8.0:fp13:*:*:*:*:*:*
OR
cpe:/a:ibm:db2_universal_database:8.0:fp9:*:*:*:*:*:*
OR
cpe:/a:ibm:db2_universal_database:9.1::fp3a:*:*:*:*:*
Denotes that component is vulnerable
BACK
microsoft
windows *
ibm
db2 8.0 fp1
ibm
db2 8.0 fp10
ibm
db2 8.0 fp11
ibm
db2 8.0 fp12
ibm
db2 8.0 fp13
ibm
db2 8.0 fp14
ibm
db2 8.0 fp15
ibm
db2 8.0 fp2
ibm
db2 8.0 fp3
ibm
db2 8.0 fp4
ibm
db2 8.0 fp5
ibm
db2 8.0 fp6
ibm
db2 8.0 fp6a
ibm
db2 8.0 fp6b
ibm
db2 8.0 fp6c
ibm
db2 8.0 fp7
ibm
db2 8.0 fp7a
ibm
db2 8.0 fp7b
ibm
db2 8.0 fp8
ibm
db2 8.0 fp8a
ibm
db2 8.0 fp9
ibm
db2 8.0 fp9a
ibm
db2 9.1 fp1
ibm
db2 9.1 fp2
ibm
db2 9.1 fp3
ibm
db2 9.1 fp3a
ibm
db2 9.1 fp4
ibm
db2 9.5
ibm
db2 universal database 8.0
ibm
db2 universal database 9.1
ibm
db2 universal database 9.5
ibm
db2 universal database 9.1 fp4
ibm
db2 universal database 9.1 fp3
ibm
db2 universal database 9.1
ibm
db2 universal database 8.0 fp14
ibm
db2 universal database 8.0 fp13
ibm
db2 universal database 8.0 fp9
ibm
db2 universal database 9.1