CVE-2010-4069 : Detail

CVE-2010-4069

Overflow
2.36%V3
Network
2010-10-25
19h00 +00:00
2024-09-16
22h29 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Stack-based buffer overflow in IBM Informix Dynamic Server (IDS) 7.x through 7.31, 9.x through 9.40, 10.00 before 10.00.xC10, 11.10 before 11.10.xC3, and 11.50 before 11.50.xC3 allows remote authenticated users to execute arbitrary code via long DBINFO keyword arguments in a SQL statement, aka idsdb00165017, idsdb00165019, idsdb00165021, idsdb00165022, and idsdb00165023.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

Metrics

Metrics Score Severity CVSS Vector Source
V2 8.5 AV:N/AC:M/Au:S/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Ibm>>Informix_dynamic_server >> Version 7.31

Ibm>>Informix_dynamic_server >> Version 9.40.tc5

Ibm>>Informix_dynamic_server >> Version 9.40.uc1

Ibm>>Informix_dynamic_server >> Version 9.40.uc2

Ibm>>Informix_dynamic_server >> Version 9.40.uc3

Ibm>>Informix_dynamic_server >> Version 9.40.uc5

Ibm>>Informix_dynamic_server >> Version 9.40.xc5

Ibm>>Informix_dynamic_server >> Version 9.40.xc7

Ibm>>Informix_dynamic_server >> Version 10.00

Ibm>>Informix_dynamic_server >> Version 10.00.tc3tl

Ibm>>Informix_dynamic_server >> Version 10.00.xc1

    Ibm>>Informix_dynamic_server >> Version 10.00.xc2

      Ibm>>Informix_dynamic_server >> Version 10.00.xc3

        Ibm>>Informix_dynamic_server >> Version 10.00.xc4

        Ibm>>Informix_dynamic_server >> Version 10.00.xc5

        Ibm>>Informix_dynamic_server >> Version 10.00.xc6

        Ibm>>Informix_dynamic_server >> Version 10.00.xc7w1

          Ibm>>Informix_dynamic_server >> Version 10.00.xc8

          Ibm>>Informix_dynamic_server >> Version 10.00.xc9

          Ibm>>Informix_dynamic_server >> Version 10.00.xc10

          Ibm>>Informix_dynamic_server >> Version 11.10

          Ibm>>Informix_dynamic_server >> Version 11.10.tb4tl

          Ibm>>Informix_dynamic_server >> Version 11.10.xc1

          Ibm>>Informix_dynamic_server >> Version 11.10.xc1de

            Ibm>>Informix_dynamic_server >> Version 11.10.xc2

            Ibm>>Informix_dynamic_server >> Version 11.10.xc2e

              Ibm>>Informix_dynamic_server >> Version 11.50

                Ibm>>Informix_dynamic_server >> Version 11.50.xc1

                  Ibm>>Informix_dynamic_server >> Version 11.50.xc2

                    References

                    http://www.vupen.com/english/advisories/2010/2735
                    Tags : vdb-entry, x_refsource_VUPEN
                    http://www.osvdb.org/68707
                    Tags : vdb-entry, x_refsource_OSVDB
                    http://secunia.com/advisories/41914
                    Tags : third-party-advisory, x_refsource_SECUNIA