The host is installed with IBM DB2 and is prone to buffer overflow and TLS renegotiation vulnerabilities.
Successful exploitation will allow attacker to cause a denial of service or to bypass security restrictions. Impact Level: System/Application
Update IBM DB2 9.1 FP9, For updates refer to http://www-01.ibm.com/support/docview.wss?rs=71&uid=swg27007053
The flaws are due to: - Buffer overflow error within the scalar function 'REPEAT', which could allow malicious users to cause a vulnerable server to crash. - An error in the 'TLS' implementation while handling session 're-negotiations' which can be exploited to insert arbitrary plaintext into an existing TLS session via Man-in-the-Middle (MitM) attacks.
IBM DB2 version 9.1 prior to FP9
- PostgreSQL 'make check' Local Privilege Escalation Vulnerability July14 (Windows)
- IBM DB2 Chaining Functionality DRDA Module DoS Vulnerability
- IBM DB2 Client Interfaces component Unspecified Vulnerabilities (Linux)
- MySQL Authentication Bypass
- Oracle MySQL Multiple Unspecified vulnerabilities - 02 Jan14 (Windows)