CVE-2024-47118: CWE-121 Stack-based Buffer Overflow in IBM Db2
IBM Db2 10.5.0 through 10.5.11, 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through 12.1.3 for Linux, UNIX and Windows (includes Db2 Connect Server) is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query.
AI Analysis
Technical Summary
CVE-2024-47118 is a stack-based buffer overflow vulnerability classified under CWE-121 affecting IBM Db2 database server versions 10.5.0 through 10.5.11, 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through 12.1.3 across Linux, UNIX, and Windows platforms, including Db2 Connect Server. The flaw arises when the server processes specially crafted queries that trigger a buffer overflow on the stack, leading to a denial of service condition by crashing the Db2 server process. The vulnerability can be exploited remotely over the network (AV:N) with low attack complexity (AC:L) and requires low privileges (PR:L), but no user interaction (UI:N) is needed. The impact is limited to availability (A:H) with no confidentiality or integrity compromise. Although no public exploits are currently known, the vulnerability poses a risk to database availability, potentially disrupting business operations relying on Db2. The vulnerability affects multiple major Db2 versions, indicating a broad attack surface. The absence of patches at the time of reporting necessitates immediate risk mitigation. The vulnerability's medium CVSS score of 6.5 reflects moderate severity, primarily due to its denial of service impact and ease of exploitation with low privileges.
Potential Impact
For European organizations, this vulnerability could lead to significant service disruptions, especially for enterprises relying heavily on IBM Db2 for critical data management, such as financial institutions, government agencies, and large enterprises. A successful exploit could crash database servers, causing downtime, loss of availability of critical applications, and potential cascading effects on dependent services. This could impact business continuity, regulatory compliance (e.g., GDPR mandates on service availability), and customer trust. Since the vulnerability does not compromise data confidentiality or integrity, the primary concern is operational disruption. Organizations with high transaction volumes or real-time data processing requirements may experience amplified impacts. Additionally, denial of service incidents could be leveraged as part of multi-vector attacks targeting European critical infrastructure or economic sectors.
Mitigation Recommendations
1. Monitor IBM’s official channels for patches or security updates addressing CVE-2024-47118 and apply them promptly once available. 2. Restrict network access to Db2 servers by implementing strict firewall rules, allowing only trusted hosts and management networks to connect. 3. Employ database activity monitoring to detect and alert on anomalous or malformed query patterns that could exploit the vulnerability. 4. Use network segmentation to isolate Db2 servers from general user networks and reduce exposure. 5. Enforce the principle of least privilege for database users and service accounts to limit potential exploitation scope. 6. Conduct regular backups and test recovery procedures to minimize downtime impact in case of a denial of service event. 7. Consider deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to detect and block suspicious Db2 query traffic. 8. Educate database administrators and security teams about the vulnerability and signs of exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium, Switzerland
CVE-2024-47118: CWE-121 Stack-based Buffer Overflow in IBM Db2
Description
IBM Db2 10.5.0 through 10.5.11, 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through 12.1.3 for Linux, UNIX and Windows (includes Db2 Connect Server) is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query.
AI-Powered Analysis
Technical Analysis
CVE-2024-47118 is a stack-based buffer overflow vulnerability classified under CWE-121 affecting IBM Db2 database server versions 10.5.0 through 10.5.11, 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through 12.1.3 across Linux, UNIX, and Windows platforms, including Db2 Connect Server. The flaw arises when the server processes specially crafted queries that trigger a buffer overflow on the stack, leading to a denial of service condition by crashing the Db2 server process. The vulnerability can be exploited remotely over the network (AV:N) with low attack complexity (AC:L) and requires low privileges (PR:L), but no user interaction (UI:N) is needed. The impact is limited to availability (A:H) with no confidentiality or integrity compromise. Although no public exploits are currently known, the vulnerability poses a risk to database availability, potentially disrupting business operations relying on Db2. The vulnerability affects multiple major Db2 versions, indicating a broad attack surface. The absence of patches at the time of reporting necessitates immediate risk mitigation. The vulnerability's medium CVSS score of 6.5 reflects moderate severity, primarily due to its denial of service impact and ease of exploitation with low privileges.
Potential Impact
For European organizations, this vulnerability could lead to significant service disruptions, especially for enterprises relying heavily on IBM Db2 for critical data management, such as financial institutions, government agencies, and large enterprises. A successful exploit could crash database servers, causing downtime, loss of availability of critical applications, and potential cascading effects on dependent services. This could impact business continuity, regulatory compliance (e.g., GDPR mandates on service availability), and customer trust. Since the vulnerability does not compromise data confidentiality or integrity, the primary concern is operational disruption. Organizations with high transaction volumes or real-time data processing requirements may experience amplified impacts. Additionally, denial of service incidents could be leveraged as part of multi-vector attacks targeting European critical infrastructure or economic sectors.
Mitigation Recommendations
1. Monitor IBM’s official channels for patches or security updates addressing CVE-2024-47118 and apply them promptly once available. 2. Restrict network access to Db2 servers by implementing strict firewall rules, allowing only trusted hosts and management networks to connect. 3. Employ database activity monitoring to detect and alert on anomalous or malformed query patterns that could exploit the vulnerability. 4. Use network segmentation to isolate Db2 servers from general user networks and reduce exposure. 5. Enforce the principle of least privilege for database users and service accounts to limit potential exploitation scope. 6. Conduct regular backups and test recovery procedures to minimize downtime impact in case of a denial of service event. 7. Consider deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to detect and block suspicious Db2 query traffic. 8. Educate database administrators and security teams about the vulnerability and signs of exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2024-09-18T19:27:02.822Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690e3d06dc0204d2f65bb8c0
Added to database: 11/7/2025, 6:40:06 PM
Last enriched: 11/7/2025, 6:40:52 PM
Last updated: 11/20/2025, 1:11:19 PM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
US and Allies Sanction Russian Bulletproof Hosting Service Providers
MediumCVE-2025-40601: CWE-121 Stack-based Buffer Overflow in SonicWall SonicOS
HighCVE-2025-40605: CWE-23 Relative Path Traversal in SonicWall Email Security
HighCVE-2025-40604: CWE-494 Download of Code Without Integrity Check in SonicWall Email Security
HighCVE-2025-12414: CWE-290 Authentication Bypass by Spoofing in Google Cloud Looker
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.