Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:advanced_enterprise_server:*:*:*", "matchCriteriaId": "01AAB8D8-7C12-4875-A2B1-1A38AE5089F1", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:advanced_workgroup_server:*:*:*", "matchCriteriaId": "C8A89B68-85AE-4E74-A7FA-A3427B749184", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:connect_application_server:*:*:*", "matchCriteriaId": "7300C988-1E37-4223-96AC-F1AD29AD6A01", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:connect_enterprise:*:*:*", "matchCriteriaId": "A886F573-1738-43FC-857D-E400D21D9EEF", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:connect_unlimited:system_i:*:*", "matchCriteriaId": "1DDAAA36-B373-4274-98EF-3A8D09583D58", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:connect_unlimited:system_z:*:*", "matchCriteriaId": "407B7D0D-BEB2-435F-825E-7F05DB839411", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:enterprise_server:*:*:*", "matchCriteriaId": "5AE05CC8-1F9F-443C-B730-9A638B265FCA", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:express:*:*:*", "matchCriteriaId": "ACEB3F4A-6411-4456-9B89-A43562189BD3", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:workgroup_server:*:*:*", "matchCriteriaId": "588D7056-6628-44F0-87C3-A7E6A3632E00", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:advanced_enterprise_server:*:*:*", "matchCriteriaId": "F7581189-E410-4A9E-82C3-06FC7C083521", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:advanced_workgroup_server:*:*:*", "matchCriteriaId": "EFFAD344-C474-46AD-9AA4-77522D6F824C", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:connect_application_server:*:*:*", "matchCriteriaId": "5164C026-542F-447B-8A74-C1470DA6645E", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:connect_enterprise:*:*:*", "matchCriteriaId": "537632F6-915D-42C8-9557-37E2B31BC059", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:connect_unlimited:system_i:*:*", "matchCriteriaId": "6C2F777F-9171-475B-8165-1A60641AE263", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:connect_unlimited:system_z:*:*", "matchCriteriaId": "3C548E05-CFD4-4776-850C-51EFADE2745D", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:enterprise_server:*:*:*", "matchCriteriaId": "AC632967-B490-4EAD-BA37-AADE4D71B328", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:express:*:*:*", "matchCriteriaId": "8D274B00-C986-4A5D-94B2-79F4A613D951", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:workgroup_server:*:*:*", "matchCriteriaId": "1C582B53-3F65-4CDA-B6E0-F5AEC228E34E", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:advanced_enterprise_server:*:*:*", "matchCriteriaId": "7A227837-D25A-4378-A1FA-7C104638AAF9", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:advanced_workgroup_server:*:*:*", "matchCriteriaId": "F2446FCC-01B4-4C78-8C07-072A8CBA756D", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:connect_application_server:*:*:*", "matchCriteriaId": "08F4CF0C-6FB9-4105-9362-77E7C6D7DE69", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:connect_enterprise:*:*:*", "matchCriteriaId": "3EB89228-61ED-45A4-B676-17665E18759E", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:connect_unlimited:system_i:*:*", "matchCriteriaId": "C03364AF-D21F-4F5F-B02E-E69E042567C0", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:connect_unlimited:system_z:*:*", "matchCriteriaId": "BA1F1069-5361-4E75-AD69-BD499AD1100F", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:enterprise_server:*:*:*", "matchCriteriaId": "3635D883-4AC7-4C0D-9838-85FE5B517578", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:express:*:*:*", "matchCriteriaId": "9AFEA656-426C-4F18-9737-8985531C7A93", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:workgroup_server:*:*:*", "matchCriteriaId": "38F1E1DE-5DA9-4FC0-B16F-78450FF840EF", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*", "matchCriteriaId": "F480AA32-841A-4E68-9343-B2E7548B0A0C", "vulnerable": false}, {"criteria": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "matchCriteriaId": "E492C463-D76E-49B7-A4D4-3B499E422D89", "vulnerable": false}, {"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false}, {"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false}, {"criteria": "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*", "matchCriteriaId": "91F372EA-3A78-4703-A457-751B2C98D796", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ibm:db2:9.8:*:*:*:enterprise_server:*:*:*", "matchCriteriaId": "4E153CD0-80EA-42CC-9105-3E8C3651F1B8", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "matchCriteriaId": "E492C463-D76E-49B7-A4D4-3B499E422D89", "vulnerable": false}, {"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "IBM DB2 9.7, 10.1 before FP6, and 10.5 before FP8 on AIX, Linux, HP, Solaris and Windows allow remote authenticated users to cause a denial of service (daemon crash) via a SELECT statement with a subquery containing the AVG OLAP function on an Oracle compatible database."}, {"lang": "es", "value": "IBM DB2 9.7, 10.1 anterior a FP6 y 10.5 anterior a FP8 en AIX, Linux, HP, Solaris y Windows permite que usuarios autenticados remotos provoquen una denegaci\u00f3n de servicio (cierre inesperado del demonio) mediante una instrucci\u00f3n SELECT con una subcadena que contiene la funci\u00f3n AVG OLAP en una base de datos compatible con Oracle."}], "id": "CVE-2016-0215", "lastModified": "2024-11-21T02:41:17.433", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-01-16T19:29:00.887", "references": [{"source": "psirt@us.ibm.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979986"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979986"}], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-20"}], "source": "nvd@nist.gov", "type": "Primary"}]}