Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47118: CWE-121 Stack-based Buffer Overflow in IBM Db2

0
Medium
VulnerabilityCVE-2024-47118cvecve-2024-47118cwe-121
Published: Fri Nov 07 2025 (11/07/2025, 18:23:07 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Db2

Description

IBM Db2 10.5.0 through 10.5.11, 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through 12.1.3 for Linux, UNIX and Windows (includes Db2 Connect Server) is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query.

AI-Powered Analysis

AILast updated: 11/07/2025, 18:40:52 UTC

Technical Analysis

CVE-2024-47118 is a stack-based buffer overflow vulnerability classified under CWE-121 affecting IBM Db2 database server versions 10.5.0 through 10.5.11, 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through 12.1.3 across Linux, UNIX, and Windows platforms, including Db2 Connect Server. The flaw arises when the server processes specially crafted queries that trigger a buffer overflow on the stack, leading to a denial of service condition by crashing the Db2 server process. The vulnerability can be exploited remotely over the network (AV:N) with low attack complexity (AC:L) and requires low privileges (PR:L), but no user interaction (UI:N) is needed. The impact is limited to availability (A:H) with no confidentiality or integrity compromise. Although no public exploits are currently known, the vulnerability poses a risk to database availability, potentially disrupting business operations relying on Db2. The vulnerability affects multiple major Db2 versions, indicating a broad attack surface. The absence of patches at the time of reporting necessitates immediate risk mitigation. The vulnerability's medium CVSS score of 6.5 reflects moderate severity, primarily due to its denial of service impact and ease of exploitation with low privileges.

Potential Impact

For European organizations, this vulnerability could lead to significant service disruptions, especially for enterprises relying heavily on IBM Db2 for critical data management, such as financial institutions, government agencies, and large enterprises. A successful exploit could crash database servers, causing downtime, loss of availability of critical applications, and potential cascading effects on dependent services. This could impact business continuity, regulatory compliance (e.g., GDPR mandates on service availability), and customer trust. Since the vulnerability does not compromise data confidentiality or integrity, the primary concern is operational disruption. Organizations with high transaction volumes or real-time data processing requirements may experience amplified impacts. Additionally, denial of service incidents could be leveraged as part of multi-vector attacks targeting European critical infrastructure or economic sectors.

Mitigation Recommendations

1. Monitor IBM’s official channels for patches or security updates addressing CVE-2024-47118 and apply them promptly once available. 2. Restrict network access to Db2 servers by implementing strict firewall rules, allowing only trusted hosts and management networks to connect. 3. Employ database activity monitoring to detect and alert on anomalous or malformed query patterns that could exploit the vulnerability. 4. Use network segmentation to isolate Db2 servers from general user networks and reduce exposure. 5. Enforce the principle of least privilege for database users and service accounts to limit potential exploitation scope. 6. Conduct regular backups and test recovery procedures to minimize downtime impact in case of a denial of service event. 7. Consider deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to detect and block suspicious Db2 query traffic. 8. Educate database administrators and security teams about the vulnerability and signs of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2024-09-18T19:27:02.822Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690e3d06dc0204d2f65bb8c0

Added to database: 11/7/2025, 6:40:06 PM

Last enriched: 11/7/2025, 6:40:52 PM

Last updated: 11/20/2025, 1:11:19 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats