Lucene search

K
ibmIBM416EA294C1861FD3E5248533D1645F5079C4CC5E18AC8043AD85F0C0D73AB36B
HistorySep 25, 2022 - 11:13 p.m.

Security Bulletin: IBM Informix Dynamic Server SET COLLATION vulnerability (CVE-2012-3334).

2022-09-2523:13:40
www.ibm.com
14
ibm
informix
dynamic server
buffer overflow
vulnerability
code execution
database server
authentication
privilege escalation
cve-2012-3334

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

7.2 High

AI Score

Confidence

Low

0.926 High

EPSS

Percentile

99.0%

Abstract

A stack-based buffer overflow in IBM Informix Dynamic Server 11.50 and 11.70 could allow code execution.

Content

VULNERABILITY DETAILS
The specific flaw exists when processing the arguments to the SET COLLATION statement. Exploitation can result in arbitrary code execution with the privileges of the database server.

CVE ID: CVE-2012-3334

DESCRIPTION:
Authenticated users may be able to send a message to the Informix database that will crash the server, or cause arbitrary code execution with elevated privileges.

CVSS:
CVSS Base Score: 9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/78277 for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:L/Au:S/C:C/I:C/A:C)

AFFECTED PLATFORMS:

All platforms.

Affected releases: 11.50 — any version prior to 11.50.xC9W2; 11.70 — any version prior to 11.70.xC5

**REMEDIATION:**Upgrade to a version of Informix Dynamic Server with the fix (11.50.xC9W2 or later; 11.70.xC5 or later).
Please contact support to request delivery of the current version. A current support agreement is required.

Workaround(s):
None known.

Mitigation(s):
None known.

REFERENCES:

ACKNOWLEDGEMENT:
This vulnerability was reported to IBM by Ewerson Guimaraes and Rodrigo Escobar of DcLabs Security Research Group

**
CHANGE HISTORY: **
October 5, 2012: Acknowledgements added

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{“Product”:{“code”:“SSGU8G”,“label”:“Informix Servers”},“Business Unit”:{“code”:“BU053”,“label”:“Cloud & Data Platform”},“Component”:“IBM Database Add-Ins for Visual Studio”,“Platform”:[{“code”:“PF002”,“label”:“AIX”},{“code”:“PF010”,“label”:“HP-UX”},{“code”:“PF016”,“label”:“Linux”},{“code”:“PF022”,“label”:“OS X”},{“code”:“PF027”,“label”:“Solaris”},{“code”:“PF033”,“label”:“Windows”}],“Version”:“11.5;11.7”,“Edition”:“”,“Line of Business”:{“code”:“LOB10”,“label”:“Data and AI”}}]

Affected configurations

Vulners
Node
ibminformix_jdbcMatch11.5
OR
ibminformix_jdbcMatch11.7

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

7.2 High

AI Score

Confidence

Low

0.926 High

EPSS

Percentile

99.0%

Related for 416EA294C1861FD3E5248533D1645F5079C4CC5E18AC8043AD85F0C0D73AB36B