CVE-2008-0727 Details

CVE-2008-0727

Published: 2008-03-18
Last Modified: 2018-10-15
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

Multiple buffer overflows in oninit.exe in IBM Informix Dynamic Server (IDS) 7.x through 11.x allow (1) remote attackers to execute arbitrary code via a long password and (2) remote authenticated users to execute arbitrary code via a long DBPATH value.

Analysis
Common Vulnerability Score System v2.0
Severity High
Base Score 8.5/10
Exploit Score 8/10
Access Vector Network
Access Complexity Low
Authentication Single
Impact Score 9.2/10
Confidentiality Impact None
Availability Impact Complete
Integrity Impact Complete
Vector String AV:N/AC:L/Au:S/C:N/I:C/A:C
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:ibm:informix_dynamic_server:7.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:ibm:informix_dynamic_server:7.31.xd8:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:ibm:informix_dynamic_server:7.31.xd9:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:ibm:informix_dynamic_server:9.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:ibm:informix_dynamic_server:9.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:ibm:informix_dynamic_server:9.40.tc5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:ibm:informix_dynamic_server:9.40.xd8:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:ibm:informix_dynamic_server:9.40_xc7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:ibm:informix_dynamic_server:10.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc7w1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc2:*:*:*:*:*:*:* Yes - -
References

http://secunia.com/advisories/29272
http://securityreason.com/securityalert/3749
http://www.securityfocus.com/archive/1/489547/100/0/threaded
http://www.securityfocus.com/archive/1/489548/100/0/threaded
http://www.securityfocus.com/bid/28198
http://www.vupen.com/english/advisories/2008/0860
http://www.zerodayinitiative.com/advisories/ZDI-08-011/
http://www.zerodayinitiative.com/advisories/ZDI-08-012/
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55207
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55208
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55209
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55210
https://exchange.xforce.ibmcloud.com/vulnerabilities/41202
https://exchange.xforce.ibmcloud.com/vulnerabilities/41203

CVE ID
CVE-2008-0727
Published
2008-03-18
Modified
2018-10-15
CVSSv2.0
High
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE-119

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.