Vulnerability Name:

CVE-2008-1998 (CCN-41960)

Assigned:2008-04-18
Published:2008-04-18
Updated:2018-10-31
Summary:The NNSTAT (aka SYSPROC.NNSTAT) procedure in IBM DB2 8 before FP16, 9.1 before FP4a, and 9.5 before FP1 on Windows allows remote authenticated users to overwrite arbitrary files via the log file parameter.
CVSS v3 Severity:3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:8.5 High (CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C)
6.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
3.0 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-264
Vulnerability Consequences:File Manipulation
References:Source: CCN
Type: BugTraq Mailing List, Fri Apr 18 2008 - 05:22:46 CDT
Team SHATTER Security Advisory: IBM DB2 UDB Arbitrary file overwrite in SYSPROC.NNSTAT procedure

Source: MITRE
Type: CNA
CVE-2008-1998

Source: CCN
Type: SA29022
IBM DB2 Multiple Vulnerabilities

Source: SECUNIA
Type: Third Party Advisory
29022

Source: CCN
Type: SA29784
IBM DB2 Multiple Vulnerabilities

Source: SECUNIA
Type: Third Party Advisory
29784

Source: SREASON
Type: Third Party Advisory
3840

Source: CCN
Type: IBM Technote (FAQ) 1255572
DB2 Version 9.1 fix packs and clients

Source: CCN
Type: IBM Technote (FAQ) 1256235
DB2 UDB Version 8 FixPaks and clients

Source: CCN
Type: IBM Technote (FAQ) 1287889
DB2 Version 9.5 fix packs and clients

Source: AIXAPAR
Type: Vendor Advisory
IZ06976

Source: AIXAPAR
Type: Vendor Advisory
IZ06977

Source: AIXAPAR
Type: Vendor Advisory
IZ10776

Source: MISC
Type: Third Party Advisory
http://www.appsecinc.com/resources/alerts/db2/2008-03.shtml

Source: CCN
Type: OSVDB ID: 41796
IBM DB2 Universal Database SYSPROC.NNSTAT log File Parameter Arbitrary File Overwrite

Source: BUGTRAQ
Type: Third Party Advisory, VDB Entry
20080418 Team SHATTER Security Advisory: IBM DB2 UDB Arbitrary file overwrite in SYSPROC.NNSTAT procedure

Source: BID
Type: Third Party Advisory, VDB Entry
28836

Source: CCN
Type: BID-28836
IBM DB2 'NNSTAT' Procedure Arbitrary File Overwrite Vulnerability

Source: XF
Type: Third Party Advisory, VDB Entry
ibm-db2-nnstat-file-overwrite(41960)

Source: XF
Type: UNKNOWN
ibm-db2-nnstat-file-overwrite(41960)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows:*:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:db2:8.0:fp1:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp10:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp11:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp12:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp13:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp14:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp15:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp2:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp3:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp4:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp5:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp6:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp6a:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp6b:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp6c:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp7:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp7a:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp7b:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp8:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp8a:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp9:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:8.0:fp9a:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1:fp1:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1:fp2:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1:fp3:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1:fp3a:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1:fp4:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.5:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:ibm:db2_universal_database:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2_universal_database:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2_universal_database:9.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2_universal_database:9.1:fp4:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2_universal_database:9.1:fp3:aix:*:*:*:*:*
  • OR cpe:/a:ibm:db2_universal_database:9.1::fp2:*:*:*:*:*
  • OR cpe:/a:ibm:db2_universal_database:8.0:fp14:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2_universal_database:8.0:fp13:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2_universal_database:8.0:fp9:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2_universal_database:9.1::fp3a:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    microsoft windows *
    ibm db2 8.0 fp1
    ibm db2 8.0 fp10
    ibm db2 8.0 fp11
    ibm db2 8.0 fp12
    ibm db2 8.0 fp13
    ibm db2 8.0 fp14
    ibm db2 8.0 fp15
    ibm db2 8.0 fp2
    ibm db2 8.0 fp3
    ibm db2 8.0 fp4
    ibm db2 8.0 fp5
    ibm db2 8.0 fp6
    ibm db2 8.0 fp6a
    ibm db2 8.0 fp6b
    ibm db2 8.0 fp6c
    ibm db2 8.0 fp7
    ibm db2 8.0 fp7a
    ibm db2 8.0 fp7b
    ibm db2 8.0 fp8
    ibm db2 8.0 fp8a
    ibm db2 8.0 fp9
    ibm db2 8.0 fp9a
    ibm db2 9.1 fp1
    ibm db2 9.1 fp2
    ibm db2 9.1 fp3
    ibm db2 9.1 fp3a
    ibm db2 9.1 fp4
    ibm db2 9.5
    ibm db2 universal database 8.0
    ibm db2 universal database 9.1
    ibm db2 universal database 9.5
    ibm db2 universal database 9.1 fp4
    ibm db2 universal database 9.1 fp3
    ibm db2 universal database 9.1
    ibm db2 universal database 8.0 fp14
    ibm db2 universal database 8.0 fp13
    ibm db2 universal database 8.0 fp9
    ibm db2 universal database 9.1