Learn about CVE-2023-47158 impacting IBM Db2 for Linux, UNIX and Windows versions 10.1, 10.5, and 11.1. Understand the risks, impact, and mitigation strategies for this vulnerability.
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.1, 10.5, and 11.1 could allow an authenticated user with CONNECT privileges to cause a denial of service using a specially crafted query.
Understanding CVE-2023-47158
This CVE affects IBM Db2 for Linux, UNIX and Windows versions 10.1, 10.5, and 11.1, enabling an authenticated user with CONNECT privileges to execute a Denial of Service (DoS) attack through a malicious query.
What is CVE-2023-47158?
CVE-2023-47158 is a vulnerability in IBM Db2 that permits a user with specific privileges to disrupt the service availability by leveraging a crafted query, potentially leading to service downtime.
The Impact of CVE-2023-47158
The impact of this CVE is medium with a CVSS base score of 5.3. It poses a threat to the availability of the affected systems but does not compromise confidentiality or integrity.
Technical Details of CVE-2023-47158
The vulnerability is categorized as CWE-20 - Improper Input Validation. It has a CVSS v3.1 base score of 5.3, indicating a medium-severity issue with high attack complexity and impact on availability.
Vulnerability Description
The flaw in IBM Db2 allows an authenticated user to perform a DoS attack using a specially crafted query, affecting versions 10.1, 10.5, and 11.1.
Affected Systems and Versions
IBM Db2 for Linux, UNIX and Windows versions 10.1, 10.5, and 11.1 are impacted by this vulnerability.
Exploitation Mechanism
An authenticated user with CONNECT privileges can exploit this vulnerability by executing a malicious query, leading to a denial of service.
Mitigation and Prevention
To mitigate the risks associated with CVE-2023-47158, follow these recommendations:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure that you keep your IBM Db2 installations up to date with the latest security patches and updates to address vulnerabilities.