Vulnerability Name:

CVE-2012-2197 (CCN-76286)

Assigned:2012-07-25
Published:2012-07-25
Updated:2017-12-22
Summary:Stack-based buffer overflow in the Java Stored Procedure infrastructure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote authenticated users to execute arbitrary code by leveraging certain CONNECT and EXECUTE privileges.
CVSS v3 Severity:8.0 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.1 High (CVSS v2 Vector: AV:N/AC:H/Au:S/C:C/I:C/A:C)
5.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:H/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
8.5 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C)
6.3 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2012-2197

Source: CCN
Type: SA49919
IBM DB2 Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
49919

Source: AIXAPAR
Type: Vendor Advisory
IC84555

Source: AIXAPAR
Type: UNKNOWN
IC84752

Source: AIXAPAR
Type: UNKNOWN
IC84753

Source: AIXAPAR
Type: UNKNOWN
IC84754

Source: AIXAPAR
Type: UNKNOWN
IC84755

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=swg21600837

Source: CCN
Type: IBM Security Bulletin 1607628
Buffer Overflow Vulnerability in IBM DB2 Java Stored Procedure Infrastructure (CVE-2012-2197)

Source: CCN
Type: OSVDB ID: 84047
IBM DB2 Java Stored Procedure Infrastructure Unspecified Overflow

Source: BID
Type: UNKNOWN
54487

Source: CCN
Type: BID-54487
IBM DB2 Multiple File Disclosure Security Bypass and Stack Buffer Overflow Vulnerabilities

Source: XF
Type: UNKNOWN
db2-javasp-bo(76286)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ibm:db2:9.1:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1.0.2:a:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1.0.3:a:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1.0.4:a:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1.0.6:a:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1.0.7:a:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.1.0.11:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:ibm:db2:9.5:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.5.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.5.0.2:a:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.5.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.5.0.3:a:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.5.0.3:b:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.5.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.5.0.4:a:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.5.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.5.0.6:a:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.5.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.5.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.5.0.9:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:ibm:db2:9.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.7.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.7.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.7.0.6:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:ibm:db2:9.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.8.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.8.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:9.8.0.5:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/a:ibm:db2:10.1:*:*:*:*:-:*:*

  • Configuration CCN 1:
  • cpe:/a:ibm:db2_universal_database:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2_universal_database:9.5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.precise:def:20122197000
    V
    CVE-2012-2197 on Ubuntu 12.04 LTS (precise) - medium.
    2012-07-25
    BACK
    ibm db2 9.1
    ibm db2 9.1.0.1
    ibm db2 9.1.0.2
    ibm db2 9.1.0.2 a
    ibm db2 9.1.0.3
    ibm db2 9.1.0.3 a
    ibm db2 9.1.0.4
    ibm db2 9.1.0.4 a
    ibm db2 9.1.0.5
    ibm db2 9.1.0.6
    ibm db2 9.1.0.6 a
    ibm db2 9.1.0.7
    ibm db2 9.1.0.7 a
    ibm db2 9.1.0.8
    ibm db2 9.1.0.9
    ibm db2 9.1.0.10
    ibm db2 9.1.0.11
    ibm db2 9.5
    ibm db2 9.5.0.1
    ibm db2 9.5.0.2
    ibm db2 9.5.0.2 a
    ibm db2 9.5.0.3
    ibm db2 9.5.0.3 a
    ibm db2 9.5.0.3 b
    ibm db2 9.5.0.4
    ibm db2 9.5.0.4 a
    ibm db2 9.5.0.5
    ibm db2 9.5.0.6 a
    ibm db2 9.5.0.7
    ibm db2 9.5.0.8
    ibm db2 9.5.0.9
    ibm db2 9.7
    ibm db2 9.7.0.1
    ibm db2 9.7.0.2
    ibm db2 9.7.0.3
    ibm db2 9.7.0.4
    ibm db2 9.7.0.5
    ibm db2 9.7.0.6
    ibm db2 9.8
    ibm db2 9.8.0.3
    ibm db2 9.8.0.4
    ibm db2 9.8.0.5
    ibm db2 10.1
    ibm db2 universal database 9.1
    ibm db2 universal database 9.5