FKIE_CVE-2010-2771
Vulnerability from fkie_nvd - Published: 2010-07-22 05:43 - Updated: 2026-04-29 01:13
Severity ?
Summary
solid.exe in IBM solidDB before 6.5 FP2 allows remote attackers to execute arbitrary code via a long username field in the first handshake packet.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| ibm | soliddb | * | |
| ibm | soliddb | 4.5.167 | |
| ibm | soliddb | 4.5.168 | |
| ibm | soliddb | 4.5.169 | |
| ibm | soliddb | 4.5.173 | |
| ibm | soliddb | 4.5.175 | |
| ibm | soliddb | 4.5.176 | |
| ibm | soliddb | 4.5.178 | |
| ibm | soliddb | 06.00.1018 | |
| ibm | soliddb | 6.0.1060 | |
| ibm | soliddb | 6.0.1061 | |
| ibm | soliddb | 6.0.1064 | |
| ibm | soliddb | 6.0.1065 | |
| ibm | soliddb | 6.0.1066 | |
| ibm | soliddb | 6.1 | |
| ibm | soliddb | 6.1.20 | |
| ibm | soliddb | 6.3.33 | |
| ibm | soliddb | 6.3.37 | |
| ibm | soliddb | 6.5.0.0 | |
| ibm | soliddb | 6.30.0039 | |
| ibm | soliddb | 6.30.0040 | |
| ibm | soliddb | 6.30.0044 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:soliddb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A348D573-0889-4F70-ACC6-4EA0164E541A",
"versionEndIncluding": "6.5.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:4.5.167:*:*:*:*:*:*:*",
"matchCriteriaId": "8A0DA527-397A-47B4-AB5A-9BBC5A7DAA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:4.5.168:*:*:*:*:*:*:*",
"matchCriteriaId": "17BC676A-05D1-4E4E-9D2F-33BCA932F4F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:4.5.169:*:*:*:*:*:*:*",
"matchCriteriaId": "B39D6B29-E377-43C9-AC3B-6AF1C6ADFE54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:4.5.173:*:*:*:*:*:*:*",
"matchCriteriaId": "40FBFD43-2751-4D92-B193-D0E2069A139C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:4.5.175:*:*:*:*:*:*:*",
"matchCriteriaId": "55CB9B6C-B28E-42DC-982C-4DCA6A556ACF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:4.5.176:*:*:*:*:*:*:*",
"matchCriteriaId": "E5D6921F-5C5D-476E-B711-165A0A44FBA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:4.5.178:*:*:*:*:*:*:*",
"matchCriteriaId": "DACBCB28-150F-44E2-AA56-EB61A67E4805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:06.00.1018:*:*:*:*:*:*:*",
"matchCriteriaId": "979423E3-2025-4EB2-B1C5-5C6B6A39B745",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:6.0.1060:*:*:*:*:*:*:*",
"matchCriteriaId": "52BFE67B-53D1-4D07-A90D-8103C0C06BCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:6.0.1061:*:*:*:*:*:*:*",
"matchCriteriaId": "1BAF8235-C7C6-4CBD-89AF-636ADD9F2C51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:6.0.1064:*:*:*:*:*:*:*",
"matchCriteriaId": "314B1005-9DEA-4F8C-9527-5F6A511A2B66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:6.0.1065:*:*:*:*:*:*:*",
"matchCriteriaId": "3E76225E-A7C1-4E52-B2C9-B3D491B2B1DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:6.0.1066:*:*:*:*:*:*:*",
"matchCriteriaId": "7D7CFB62-6B88-4A1E-8346-7F7BC8A6B3D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE6F23C-0E59-4B13-9D52-3F47CE99FED6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:6.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "F979E6DD-CFDE-4A16-AC59-A2738A00749C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:6.3.33:*:*:*:*:*:*:*",
"matchCriteriaId": "6CC69E56-801F-4498-8284-A5E3542BE533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:6.3.37:*:*:*:*:*:*:*",
"matchCriteriaId": "B04C078E-F68C-4C01-90B7-E24BA1279402",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:6.5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1C7CD010-0CF0-4111-A056-40C134367809",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:6.30.0039:*:*:*:*:*:*:*",
"matchCriteriaId": "92413864-00FB-42FC-9832-0A6DEB3B078E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:6.30.0040:*:*:*:*:*:*:*",
"matchCriteriaId": "53D81C90-1570-448F-8850-F9DC4276253B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:soliddb:6.30.0044:*:*:*:*:*:*:*",
"matchCriteriaId": "F73F6068-B8B8-468D-8729-DBBEADD3935E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "solid.exe in IBM solidDB before 6.5 FP2 allows remote attackers to execute arbitrary code via a long username field in the first handshake packet."
},
{
"lang": "es",
"value": "solid.exe en IBM solidDB anterior a v6.5 FP2 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un campo de nombre de usuario largo en el primer paquete de negociaci\u00f3n."
}
],
"id": "CVE-2010-2771",
"lastModified": "2026-04-29T01:13:23.040",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-07-22T05:43:58.217",
"references": [
{
"source": "cve@mitre.org",
"url": "http://publib.boulder.ibm.com/infocenter/soliddb/v6r5/index.jsp?topic=/com.ibm.swg.im.soliddb.common.doc/doc/detailed.list.fixes.html"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1024203"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/41653"
},
{
"source": "cve@mitre.org",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-125/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://publib.boulder.ibm.com/infocenter/soliddb/v6r5/index.jsp?topic=/com.ibm.swg.im.soliddb.common.doc/doc/detailed.list.fixes.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1024203"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/41653"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-125/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…