CVE-2013-3031 (GCVE-0-2013-3031)

Vulnerability from cvelistv5 – Published: 2013-09-09 01:00 – Updated: 2024-08-06 16:00
VLAI?
Summary
A SQL stored procedure in the Universal Cache component in IBM solidDB 6.0.x before 6.0.1070, 6.3.x before 6.3.0.56, 6.5.x before 6.5.0.12, and 7.0.x before 7.0.0.4 allows remote authenticated users to cause a denial of service (uninitialized-memory access and daemon crash) via a call that includes named arguments and default parameter values, but does not include all of the expected arguments.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
ibm
References
Date Public ?
2013-08-23 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:00:08.392Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IC88796",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC88796"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643599"
          },
          {
            "name": "IC94043",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC94043"
          },
          {
            "name": "soliddb-cve20133031-uninitialized-data(84593)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84593"
          },
          {
            "name": "IC88797",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC88797"
          },
          {
            "name": "IC94044",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC94044"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-08-23T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A SQL stored procedure in the Universal Cache component in IBM solidDB 6.0.x before 6.0.1070, 6.3.x before 6.3.0.56, 6.5.x before 6.5.0.12, and 7.0.x before 7.0.0.4 allows remote authenticated users to cause a denial of service (uninitialized-memory access and daemon crash) via a call that includes named arguments and default parameter values, but does not include all of the expected arguments."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01.000Z",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "IC88796",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC88796"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643599"
        },
        {
          "name": "IC94043",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC94043"
        },
        {
          "name": "soliddb-cve20133031-uninitialized-data(84593)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84593"
        },
        {
          "name": "IC88797",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC88797"
        },
        {
          "name": "IC94044",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC94044"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2013-3031",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A SQL stored procedure in the Universal Cache component in IBM solidDB 6.0.x before 6.0.1070, 6.3.x before 6.3.0.56, 6.5.x before 6.5.0.12, and 7.0.x before 7.0.0.4 allows remote authenticated users to cause a denial of service (uninitialized-memory access and daemon crash) via a call that includes named arguments and default parameter values, but does not include all of the expected arguments."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IC88796",
              "refsource": "AIXAPAR",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC88796"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21643599",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643599"
            },
            {
              "name": "IC94043",
              "refsource": "AIXAPAR",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC94043"
            },
            {
              "name": "soliddb-cve20133031-uninitialized-data(84593)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84593"
            },
            {
              "name": "IC88797",
              "refsource": "AIXAPAR",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC88797"
            },
            {
              "name": "IC94044",
              "refsource": "AIXAPAR",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC94044"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2013-3031",
    "datePublished": "2013-09-09T01:00:00.000Z",
    "dateReserved": "2013-04-12T00:00:00.000Z",
    "dateUpdated": "2024-08-06T16:00:08.392Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2013-3031",
      "date": "2026-05-07",
      "epss": "0.00698",
      "percentile": "0.72065"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-3031\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2013-09-09T01:55:06.437\",\"lastModified\":\"2026-04-29T01:13:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A SQL stored procedure in the Universal Cache component in IBM solidDB 6.0.x before 6.0.1070, 6.3.x before 6.3.0.56, 6.5.x before 6.5.0.12, and 7.0.x before 7.0.0.4 allows remote authenticated users to cause a denial of service (uninitialized-memory access and daemon crash) via a call that includes named arguments and default parameter values, but does not include all of the expected arguments.\"},{\"lang\":\"es\",\"value\":\"Un procedimiento SQL almacenado en el componente de Cache Universal de IBM solidDB 6.0.x (anteriores a 6.0.1070), 6.3.x (anteriores a 6.3.0.56), 6.5.x (anteriores a 6.5.0.12), y 7.0.x (anteriores a 7.0.0.4) permite a usuarios remotos autentificados causar una denegaci\u00f3n de servicio (acceso a memoria no inicializada y ca\u00edda de demonio) a trav\u00e9s de una llamada que incluye argumentos con nombre y par\u00e1metros con valores por defecto, pero no incluye todos los argumentos que se esperaban.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:N/A:P\",\"baseScore\":3.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"184C4445-85A4-4EDD-A8E7-DC78BBECC014\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.0.1060:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52BFE67B-53D1-4D07-A90D-8103C0C06BCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.0.1061:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BAF8235-C7C6-4CBD-89AF-636ADD9F2C51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.0.1064:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"314B1005-9DEA-4F8C-9527-5F6A511A2B66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.0.1065:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E76225E-A7C1-4E52-B2C9-B3D491B2B1DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.0.1066:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D7CFB62-6B88-4A1E-8346-7F7BC8A6B3D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.0.1067:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C53D246D-826F-42D4-887B-F05BFB5DD1B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.0.1068:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1480DA44-FF29-48C0-8F20-144F7F6927BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.0.1069:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2C83825-D301-41A0-AD27-B6304BC43F31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CC69E56-801F-4498-8284-A5E3542BE533\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"449FC71E-AAB2-4080-B17A-B0E13A7D53E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B04C078E-F68C-4C01-90B7-E24BA1279402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5441322D-6072-4A61-852B-01E59BBD6F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA69EEDE-CEA5-4AA0-9DEF-4651DE01D9C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C63BFFB0-4BFF-4243-AABB-89F1048BDBDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2278B9BD-5187-4DBE-B4AF-2E2FC7C4AF84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2491D376-DDC4-4A37-80E9-2662F3108349\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2C3E73F-71CA-4DD8-B9A2-B20E3FDD6109\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"653AFFD4-B925-4FE1-8484-FB95FBBDE571\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27E00281-B911-460F-8CE3-CD2E6BBA9D19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E223A8E-DB18-4777-9F06-A642E620F12D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE8862B9-672F-4E36-A64B-D14F84504CB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8860A189-A39E-4C96-ACDB-E17FDB1A1795\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"224D2697-E0A1-43A5-B6C6-3222A6893AD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.3.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF3425AD-8D33-455E-B84C-9B38B838D611\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C7CD010-0CF0-4111-A056-40C134367809\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D87E5B-D3F5-4DE1-9AEE-EBC91E18D729\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CBF08E2-20E5-4042-A782-4FE89823C33B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59C7C86D-30BE-4BF0-A006-CB2FB3D674B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB4EC9D6-2A47-4F2B-B800-891B54751A42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E47444-C63B-491F-8C7F-18F8B71BEAE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D70BEFBC-D4F4-4D23-A4B0-D6DF23FE90A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AA19E9B-19FC-40EF-844C-709D989D2AB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6CACC9F-D565-46C9-B739-2A59FC0D2054\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55F762F8-7C38-4B36-A5B3-E6803AA12DD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B2FAB84-77DF-41CF-A039-E785A4A5436C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:6.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E641EB0-9E57-4C83-83E2-516B0732F1D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:7.0.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"398C36B9-78C4-4045-B795-8637833030DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:7.0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E891751B-C446-4625-93B7-B54A819203D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:7.0.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"260B6A3C-7B6C-4630-B376-CA2C150529D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:soliddb:7.0.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1979CF48-CBDC-41F8-BE14-C989B4A44235\"}]}]}],\"references\":[{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC88796\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC88797\",\"source\":\"psirt@us.ibm.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC94043\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC94044\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21643599\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/84593\",\"source\":\"psirt@us.ibm.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC88796\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC88797\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC94043\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IC94044\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21643599\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/84593\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…