CVE-2008-0727
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
18/03/2008
Last modified:
09/04/2025
Description
Multiple buffer overflows in oninit.exe in IBM Informix Dynamic Server (IDS) 7.x through 11.x allow (1) remote attackers to execute arbitrary code via a long password and (2) remote authenticated users to execute arbitrary code via a long DBPATH value.
Impact
Base Score 2.0
8.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:ibm:informix_dynamic_server:7.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:informix_dynamic_server:7.31.xd8:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:informix_dynamic_server:7.31.xd9:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:informix_dynamic_server:9.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:informix_dynamic_server:9.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:informix_dynamic_server:9.40.tc5:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc1:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc2:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc3:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc5:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:informix_dynamic_server:9.40.xd8:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:informix_dynamic_server:9.40_xc7:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:informix_dynamic_server:10.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc3:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/29272
- http://securityreason.com/securityalert/3749
- http://www-1.ibm.com/support/docview.wss?uid=swg1IC55207
- http://www-1.ibm.com/support/docview.wss?uid=swg1IC55208
- http://www-1.ibm.com/support/docview.wss?uid=swg1IC55209
- http://www-1.ibm.com/support/docview.wss?uid=swg1IC55210
- http://www.securityfocus.com/archive/1/489547/100/0/threaded
- http://www.securityfocus.com/archive/1/489548/100/0/threaded
- http://www.securityfocus.com/bid/28198
- http://www.vupen.com/english/advisories/2008/0860
- http://www.zerodayinitiative.com/advisories/ZDI-08-011/
- http://www.zerodayinitiative.com/advisories/ZDI-08-012/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41202
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41203
- http://secunia.com/advisories/29272
- http://securityreason.com/securityalert/3749
- http://www-1.ibm.com/support/docview.wss?uid=swg1IC55207
- http://www-1.ibm.com/support/docview.wss?uid=swg1IC55208
- http://www-1.ibm.com/support/docview.wss?uid=swg1IC55209
- http://www-1.ibm.com/support/docview.wss?uid=swg1IC55210
- http://www.securityfocus.com/archive/1/489547/100/0/threaded
- http://www.securityfocus.com/archive/1/489548/100/0/threaded
- http://www.securityfocus.com/bid/28198
- http://www.vupen.com/english/advisories/2008/0860
- http://www.zerodayinitiative.com/advisories/ZDI-08-011/
- http://www.zerodayinitiative.com/advisories/ZDI-08-012/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41202
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41203