7.3

CVE-2017-1297

IBM DB2 for Linux, UNIX and Windows 9.2, 10.1, 10.5, and 11.1 (includes DB2 Connect Server) is vulnerable to a stack-based buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code. IBM X-Force ID: 125159.

Data is provided by the National Vulnerability Database (NVD)
IbmData Server Client Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmData Server Driver For Odbc And Cli Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmData Server Driver Package Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmData Server Runtime Client Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version9.7 SwEditionadvanced_enterprise
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version9.7 SwEditionadvanced_workgroup
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version9.7 SwEditionenterprise
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version9.7 SwEditionexpress
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version9.7 SwEditionworkgroup
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version10.1 SwEditionadvanced_enterprise
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version10.1 SwEditionadvanced_workgroup
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version10.1 SwEditionenterprise
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version10.1 SwEditionexpress
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version10.1 SwEditionworkgroup
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version10.5 SwEditionadvanced_enterprise
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version10.5 SwEditionadvanced_workgroup
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version10.5 SwEditionenterprise
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version10.5 SwEditionexpress
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version10.5 SwEditionworkgroup
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version11.1 SwEditionadvanced_enterprise
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version11.1 SwEditionadvanced_workgroup
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version11.1 SwEditionenterprise
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version11.1 SwEditionexpress
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Version11.1 SwEditionworkgroup
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Connect Version9.7 SwEditionapplication_server
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Connect Version9.7 SwEditionenterprise
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Connect Version9.7 SwEditionunlimited
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Connect Version10.1 SwEditionapplication_server
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Connect Version10.1 SwEditionenterprise
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Connect Version10.1 SwEditionunlimited
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Connect Version10.5 SwEditionapplication_server
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Connect Version10.5 SwEditionenterprise
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Connect Version10.5 SwEditionunlimited
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Connect Version11.1.0.0 SwEditionapplication_server
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Connect Version11.1.0.0 SwEditionenterprise
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmDb2 Connect Version11.1.0.0 SwEditionunlimited
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.27% 0.471
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.3 1.3 5.9
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 4.4 3.4 6.4
AV:L/AC:M/Au:N/C:P/I:P/A:P
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.