Skip to main content

CVE-2024-49350: CWE-121 Stack-based Buffer Overflow in IBM Db2 for Linux, UNIX and Windows

Medium
VulnerabilityCVE-2024-49350cvecve-2024-49350cwe-121
Published: Thu May 29 2025 (05/29/2025, 19:18:06 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Db2 for Linux, UNIX and Windows

Description

IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9 and 12.1.0 through 12.1.1 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query.

AI-Powered Analysis

AILast updated: 07/07/2025, 22:25:02 UTC

Technical Analysis

CVE-2024-49350 is a stack-based buffer overflow vulnerability identified in IBM Db2 for Linux, UNIX, and Windows, including DB2 Connect Server versions 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through 12.1.1. This vulnerability arises due to improper handling of input data in the database server when processing certain specially crafted queries. Specifically, the flaw is classified under CWE-121, indicating a stack-based buffer overflow, which occurs when the software writes more data to a buffer located on the stack than it can hold, potentially overwriting adjacent memory. In this case, exploitation leads to a denial of service (DoS) condition as the server may crash, disrupting database availability. The vulnerability has a CVSS v3.1 base score of 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known exploits are currently reported in the wild, and no patches or fixes have been linked yet. The vulnerability affects multiple major versions of IBM Db2, a widely used enterprise database management system supporting critical business applications across various industries. The vulnerability could be triggered remotely by an attacker with low privileges by sending a maliciously crafted query to the database server, causing it to crash and resulting in service disruption. While the vulnerability does not appear to allow code execution or data compromise, the denial of service impact can be significant in environments relying on continuous database availability.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of critical database services running IBM Db2. Many enterprises, including financial institutions, manufacturing companies, public sector agencies, and telecommunications providers, rely on Db2 for their backend data management. A successful exploitation could lead to unexpected downtime, disrupting business operations, causing financial losses, and potentially violating regulatory requirements for service availability and data handling (e.g., GDPR mandates on data availability and integrity). The fact that the attack requires only low privileges and no user interaction increases the risk, especially in multi-tenant or shared environments where internal threat actors or compromised accounts could trigger the vulnerability. Additionally, the lack of current known exploits does not preclude future weaponization, so proactive mitigation is critical. The impact is primarily on availability, which can cascade into operational disruptions and reputational damage for organizations dependent on continuous database uptime.

Mitigation Recommendations

Given the absence of publicly available patches at this time, European organizations should implement several specific mitigation strategies beyond generic advice: 1) Restrict network access to IBM Db2 servers to trusted hosts and networks using firewalls and network segmentation to reduce exposure to potentially malicious queries. 2) Enforce strict access controls and monitor database user privileges to minimize the number of accounts with the ability to send queries, especially those with low privilege levels that can still trigger the vulnerability. 3) Deploy database activity monitoring tools to detect anomalous or malformed query patterns that could indicate exploitation attempts. 4) Implement robust logging and alerting mechanisms to quickly identify and respond to database crashes or unusual behavior. 5) Prepare incident response plans specifically addressing database availability incidents, including failover and recovery procedures to minimize downtime. 6) Engage with IBM support channels to obtain patches or workarounds as soon as they become available and prioritize timely deployment in test and production environments. 7) Consider temporary use of query filtering or input validation proxies if feasible to block suspicious queries. These targeted measures will help reduce the attack surface and improve detection and response capabilities until official fixes are released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2024-10-14T12:05:24.914Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6838b59f182aa0cae28b0cff

Added to database: 5/29/2025, 7:29:35 PM

Last enriched: 7/7/2025, 10:25:02 PM

Last updated: 8/15/2025, 8:30:41 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats