CVE-2013-3031 (GCVE-0-2013-3031)
Vulnerability from cvelistv5 – Published: 2013-09-09 01:00 – Updated: 2024-08-06 16:00
VLAI?
Summary
A SQL stored procedure in the Universal Cache component in IBM solidDB 6.0.x before 6.0.1070, 6.3.x before 6.3.0.56, 6.5.x before 6.5.0.12, and 7.0.x before 7.0.0.4 allows remote authenticated users to cause a denial of service (uninitialized-memory access and daemon crash) via a call that includes named arguments and default parameter values, but does not include all of the expected arguments.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Date Public ?
2013-08-23 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:00:08.392Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "IC88796",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC88796"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643599"
},
{
"name": "IC94043",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC94043"
},
{
"name": "soliddb-cve20133031-uninitialized-data(84593)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84593"
},
{
"name": "IC88797",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC88797"
},
{
"name": "IC94044",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC94044"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-08-23T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A SQL stored procedure in the Universal Cache component in IBM solidDB 6.0.x before 6.0.1070, 6.3.x before 6.3.0.56, 6.5.x before 6.5.0.12, and 7.0.x before 7.0.0.4 allows remote authenticated users to cause a denial of service (uninitialized-memory access and daemon crash) via a call that includes named arguments and default parameter values, but does not include all of the expected arguments."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01.000Z",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"name": "IC88796",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC88796"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643599"
},
{
"name": "IC94043",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC94043"
},
{
"name": "soliddb-cve20133031-uninitialized-data(84593)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84593"
},
{
"name": "IC88797",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC88797"
},
{
"name": "IC94044",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC94044"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-3031",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A SQL stored procedure in the Universal Cache component in IBM solidDB 6.0.x before 6.0.1070, 6.3.x before 6.3.0.56, 6.5.x before 6.5.0.12, and 7.0.x before 7.0.0.4 allows remote authenticated users to cause a denial of service (uninitialized-memory access and daemon crash) via a call that includes named arguments and default parameter values, but does not include all of the expected arguments."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "IC88796",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC88796"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21643599",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643599"
},
{
"name": "IC94043",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC94043"
},
{
"name": "soliddb-cve20133031-uninitialized-data(84593)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84593"
},
{
"name": "IC88797",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC88797"
},
{
"name": "IC94044",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC94044"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2013-3031",
"datePublished": "2013-09-09T01:00:00.000Z",
"dateReserved": "2013-04-12T00:00:00.000Z",
"dateUpdated": "2024-08-06T16:00:08.392Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2013-3031",
"date": "2026-05-07",
"epss": "0.00698",
"percentile": "0.72065"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2013-3031\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2013-09-09T01:55:06.437\",\"lastModified\":\"2026-04-29T01:13:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A SQL stored procedure in the Universal Cache component in IBM solidDB 6.0.x before 6.0.1070, 6.3.x before 6.3.0.56, 6.5.x before 6.5.0.12, and 7.0.x before 7.0.0.4 allows remote authenticated users to cause a denial of service (uninitialized-memory access and daemon crash) via a call that includes named arguments and default parameter values, but does not include all of the expected arguments.\"},{\"lang\":\"es\",\"value\":\"Un procedimiento SQL almacenado en el componente de Cache Universal de IBM solidDB 6.0.x (anteriores a 6.0.1070), 6.3.x (anteriores a 6.3.0.56), 6.5.x (anteriores a 6.5.0.12), y 7.0.x (anteriores a 7.0.0.4) permite a usuarios remotos autentificados causar una denegaci\u00f3n de servicio (acceso a memoria no inicializada y ca\u00edda de demonio) a trav\u00e9s de una llamada que incluye argumentos con nombre y par\u00e1metros con valores por defecto, pero no incluye todos los argumentos que se esperaban.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:N/A:P\",\"baseScore\":3.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"184C4445-85A4-4EDD-A8E7-DC78BBECC014\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.0.1060:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52BFE67B-53D1-4D07-A90D-8103C0C06BCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.0.1061:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BAF8235-C7C6-4CBD-89AF-636ADD9F2C51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.0.1064:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"314B1005-9DEA-4F8C-9527-5F6A511A2B66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.0.1065:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E76225E-A7C1-4E52-B2C9-B3D491B2B1DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.0.1066:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D7CFB62-6B88-4A1E-8346-7F7BC8A6B3D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.0.1067:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C53D246D-826F-42D4-887B-F05BFB5DD1B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.0.1068:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1480DA44-FF29-48C0-8F20-144F7F6927BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.0.1069:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2C83825-D301-41A0-AD27-B6304BC43F31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CC69E56-801F-4498-8284-A5E3542BE533\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"449FC71E-AAB2-4080-B17A-B0E13A7D53E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B04C078E-F68C-4C01-90B7-E24BA1279402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5441322D-6072-4A61-852B-01E59BBD6F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA69EEDE-CEA5-4AA0-9DEF-4651DE01D9C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C63BFFB0-4BFF-4243-AABB-89F1048BDBDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2278B9BD-5187-4DBE-B4AF-2E2FC7C4AF84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2491D376-DDC4-4A37-80E9-2662F3108349\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2C3E73F-71CA-4DD8-B9A2-B20E3FDD6109\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"653AFFD4-B925-4FE1-8484-FB95FBBDE571\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27E00281-B911-460F-8CE3-CD2E6BBA9D19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E223A8E-DB18-4777-9F06-A642E620F12D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE8862B9-672F-4E36-A64B-D14F84504CB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8860A189-A39E-4C96-ACDB-E17FDB1A1795\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"224D2697-E0A1-43A5-B6C6-3222A6893AD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF3425AD-8D33-455E-B84C-9B38B838D611\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C7CD010-0CF0-4111-A056-40C134367809\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D87E5B-D3F5-4DE1-9AEE-EBC91E18D729\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CBF08E2-20E5-4042-A782-4FE89823C33B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59C7C86D-30BE-4BF0-A006-CB2FB3D674B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB4EC9D6-2A47-4F2B-B800-891B54751A42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E47444-C63B-491F-8C7F-18F8B71BEAE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D70BEFBC-D4F4-4D23-A4B0-D6DF23FE90A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AA19E9B-19FC-40EF-844C-709D989D2AB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6CACC9F-D565-46C9-B739-2A59FC0D2054\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55F762F8-7C38-4B36-A5B3-E6803AA12DD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B2FAB84-77DF-41CF-A039-E785A4A5436C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E641EB0-9E57-4C83-83E2-516B0732F1D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:7.0.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"398C36B9-78C4-4045-B795-8637833030DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:7.0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E891751B-C446-4625-93B7-B54A819203D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:7.0.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"260B6A3C-7B6C-4630-B376-CA2C150529D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:7.0.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1979CF48-CBDC-41F8-BE14-C989B4A44235\"}]}]}],\"references\":[{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC88796\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC88797\",\"source\":\"psirt@us.ibm.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC94043\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC94044\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21643599\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/84593\",\"source\":\"psirt@us.ibm.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC88796\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC88797\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC94043\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC94044\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21643599\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/84593\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…