CVE-2008-0727

Multiple buffer overflows in oninit.exe in IBM Informix Dynamic Server (IDS) 7.x through 11.x allow (1) remote attackers to execute arbitrary code via a long password and (2) remote authenticated users to execute arbitrary code via a long DBPATH value.
References
Link Resource
http://secunia.com/advisories/29272 Vendor Advisory
http://securityreason.com/securityalert/3749
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55207
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55208
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55209
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55210
http://www.securityfocus.com/archive/1/489547/100/0/threaded
http://www.securityfocus.com/archive/1/489548/100/0/threaded
http://www.securityfocus.com/bid/28198
http://www.vupen.com/english/advisories/2008/0860
http://www.zerodayinitiative.com/advisories/ZDI-08-011/
http://www.zerodayinitiative.com/advisories/ZDI-08-012/
https://exchange.xforce.ibmcloud.com/vulnerabilities/41202
https://exchange.xforce.ibmcloud.com/vulnerabilities/41203
http://secunia.com/advisories/29272 Vendor Advisory
http://securityreason.com/securityalert/3749
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55207
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55208
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55209
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55210
http://www.securityfocus.com/archive/1/489547/100/0/threaded
http://www.securityfocus.com/archive/1/489548/100/0/threaded
http://www.securityfocus.com/bid/28198
http://www.vupen.com/english/advisories/2008/0860
http://www.zerodayinitiative.com/advisories/ZDI-08-011/
http://www.zerodayinitiative.com/advisories/ZDI-08-012/
https://exchange.xforce.ibmcloud.com/vulnerabilities/41202
https://exchange.xforce.ibmcloud.com/vulnerabilities/41203
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ibm:informix_dynamic_server:7.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:informix_dynamic_server:7.31.xd8:*:*:*:*:*:*:*
cpe:2.3:a:ibm:informix_dynamic_server:7.31.xd9:*:*:*:*:*:*:*
cpe:2.3:a:ibm:informix_dynamic_server:9.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:informix_dynamic_server:9.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:informix_dynamic_server:9.40.tc5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:informix_dynamic_server:9.40.xd8:*:*:*:*:*:*:*
cpe:2.3:a:ibm:informix_dynamic_server:9.40_xc7:*:*:*:*:*:*:*
cpe:2.3:a:ibm:informix_dynamic_server:10.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc7w1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc2:*:*:*:*:*:*:*

History

21 Nov 2024, 00:42

Type Values Removed Values Added
References () http://secunia.com/advisories/29272 - Vendor Advisory () http://secunia.com/advisories/29272 - Vendor Advisory
References () http://securityreason.com/securityalert/3749 - () http://securityreason.com/securityalert/3749 -
References () http://www-1.ibm.com/support/docview.wss?uid=swg1IC55207 - () http://www-1.ibm.com/support/docview.wss?uid=swg1IC55207 -
References () http://www-1.ibm.com/support/docview.wss?uid=swg1IC55208 - () http://www-1.ibm.com/support/docview.wss?uid=swg1IC55208 -
References () http://www-1.ibm.com/support/docview.wss?uid=swg1IC55209 - () http://www-1.ibm.com/support/docview.wss?uid=swg1IC55209 -
References () http://www-1.ibm.com/support/docview.wss?uid=swg1IC55210 - () http://www-1.ibm.com/support/docview.wss?uid=swg1IC55210 -
References () http://www.securityfocus.com/archive/1/489547/100/0/threaded - () http://www.securityfocus.com/archive/1/489547/100/0/threaded -
References () http://www.securityfocus.com/archive/1/489548/100/0/threaded - () http://www.securityfocus.com/archive/1/489548/100/0/threaded -
References () http://www.securityfocus.com/bid/28198 - () http://www.securityfocus.com/bid/28198 -
References () http://www.vupen.com/english/advisories/2008/0860 - () http://www.vupen.com/english/advisories/2008/0860 -
References () http://www.zerodayinitiative.com/advisories/ZDI-08-011/ - () http://www.zerodayinitiative.com/advisories/ZDI-08-011/ -
References () http://www.zerodayinitiative.com/advisories/ZDI-08-012/ - () http://www.zerodayinitiative.com/advisories/ZDI-08-012/ -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/41202 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/41202 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/41203 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/41203 -

Information

Published : 2008-03-18 00:44

Updated : 2024-11-21 00:42


NVD link : CVE-2008-0727

Mitre link : CVE-2008-0727

CVE.ORG link : CVE-2008-0727


JSON object : View

Products Affected

ibm

  • informix_dynamic_server
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer