Vulnerability Details : CVE-2008-0727
Multiple buffer overflows in oninit.exe in IBM Informix Dynamic Server (IDS) 7.x through 11.x allow (1) remote attackers to execute arbitrary code via a long password and (2) remote authenticated users to execute arbitrary code via a long DBPATH value.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2008-0727
Probability of exploitation activity in the next 30 days: 90.77%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-0727
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
8.5
|
HIGH | AV:N/AC:L/Au:S/C:N/I:C/A:C |
8.0
|
9.2
|
NIST |
CWE ids for CVE-2008-0727
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-0727
- http://www.vupen.com/english/advisories/2008/0860
-
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55208
-
http://www.securityfocus.com/archive/1/489547/100/0/threaded
-
http://securityreason.com/securityalert/3749
-
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55209
-
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55210
-
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55207
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41202
-
http://www.zerodayinitiative.com/advisories/ZDI-08-011/
- http://www.securityfocus.com/bid/28198
-
http://www.zerodayinitiative.com/advisories/ZDI-08-012/
-
http://www.securityfocus.com/archive/1/489548/100/0/threaded
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41203
Products affected by CVE-2008-0727
- cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:informix_dynamic_server:9.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:informix_dynamic_server:9.40.tc5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:informix_dynamic_server:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc7w1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:informix_dynamic_server:9.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:informix_dynamic_server:9.40_xc7:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:informix_dynamic_server:7.31.xd8:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:informix_dynamic_server:7.31.xd9:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:informix_dynamic_server:9.40.xd8:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:informix_dynamic_server:7.3:*:*:*:*:*:*:*