CVE-2008-3852
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
28/08/2008
Last modified:
09/04/2025
Description
Unspecified vulnerability in the CLR stored procedure deployment from IBM Database Add-Ins for Visual Studio in the Visual Studio Net component in IBM DB2 9.1 before Fixpak 5 and 9.5 before Fixpak 2 allows remote authenticated users to execute arbitrary code via unknown vectors.
Impact
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ibm:db2_universal_database:*:fp4a:aix:*:*:*:*:* | 9.1 (including) | |
| cpe:2.3:a:ibm:db2_universal_database:*:fp4a:hp-ux:*:*:*:*:* | 9.1 (including) | |
| cpe:2.3:a:ibm:db2_universal_database:*:fp4a:linux:*:*:*:*:* | 9.1 (including) | |
| cpe:2.3:a:ibm:db2_universal_database:*:fp4a:solaris:*:*:*:*:* | 9.1 (including) | |
| cpe:2.3:a:ibm:db2_universal_database:*:fp4a:windows:*:*:*:*:* | 9.1 (including) | |
| cpe:2.3:a:ibm:db2_universal_database:*:fp1:aix:*:*:*:*:* | 9.5 (including) | |
| cpe:2.3:a:ibm:db2_universal_database:*:fp1:hp-ux:*:*:*:*:* | 9.5 (including) | |
| cpe:2.3:a:ibm:db2_universal_database:*:fp1:linux:*:*:*:*:* | 9.5 (including) | |
| cpe:2.3:a:ibm:db2_universal_database:*:fp1:solaris:*:*:*:*:* | 9.5 (including) | |
| cpe:2.3:a:ibm:db2_universal_database:*:fp1:windows:*:*:*:*:* | 9.5 (including) | |
| cpe:2.3:a:ibm:db2_universal_database:9.1:*:aix:*:*:*:*:* | ||
| cpe:2.3:a:ibm:db2_universal_database:9.1:*:hp-ux:*:*:*:*:* | ||
| cpe:2.3:a:ibm:db2_universal_database:9.1:*:linux:*:*:*:*:* | ||
| cpe:2.3:a:ibm:db2_universal_database:9.1:*:solaris:*:*:*:*:* | ||
| cpe:2.3:a:ibm:db2_universal_database:9.1:*:windows:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/30558
- http://secunia.com/advisories/31635
- http://www-1.ibm.com/support/docview.wss?uid=swg1JR28431
- http://www-1.ibm.com/support/docview.wss?uid=swg1JR28432
- http://www-1.ibm.com/support/docview.wss?uid=swg21255607
- http://www-1.ibm.com/support/docview.wss?uid=swg21293566
- http://www.securityfocus.com/archive/1/496405/100/0/threaded
- http://www.securityfocus.com/bid/29601
- http://www.securitytracker.com/id?1020761=
- http://www.vupen.com/english/advisories/2008/1769
- http://www.vupen.com/english/advisories/2008/2445
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42927
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44697
- http://secunia.com/advisories/30558
- http://secunia.com/advisories/31635
- http://www-1.ibm.com/support/docview.wss?uid=swg1JR28431
- http://www-1.ibm.com/support/docview.wss?uid=swg1JR28432
- http://www-1.ibm.com/support/docview.wss?uid=swg21255607
- http://www-1.ibm.com/support/docview.wss?uid=swg21293566
- http://www.securityfocus.com/archive/1/496405/100/0/threaded
- http://www.securityfocus.com/bid/29601
- http://www.securitytracker.com/id?1020761=
- http://www.vupen.com/english/advisories/2008/1769
- http://www.vupen.com/english/advisories/2008/2445
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42927
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44697



