ID

VAR-201705-2537


CVE

CVE-2015-5401


TITLE

Teradata Gateway and Teradata Express Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-007566

DESCRIPTION

Teradata Gateway and Teradata Express There is a service disruption ( Database crash ) There are vulnerabilities that are put into a state.A remote attacker could create a malformed CONFIG REQUEST Service disruption via message ( Database crash ) There is a possibility of being put into a state. TeradataGateway and TDExpress are products of Teradata. The former is a gateway product, the latter is a free database software. There are security holes in TeradataGateway and TDExpress. Multiple Teradata Products are prone to a denial-of-service vulnerability. The following products are vulnerable: Teradata Gateway prior to 15.00.03.02-1, 15.10.x prior to 15.10.00.01-1 and Teradata Express prior to 15.00.02.08_Sles10 and 15.00.02.08_Sles11. Both Teradata Gateway and TD Express are products of Teradata Corporation of the United States. Security vulnerabilities exist in Teradata Gateway and TD Express

Trust: 1.62

sources: JVNDB: JVNDB-2015-007566 // CNVD: CNVD-2017-09374 // BID: 98655 // VULHUB: VHN-83362

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-09374

AFFECTED PRODUCTS

vendor:teradatamodel:expressscope:eqversion:15.10.00

Trust: 1.6

vendor:teradatamodel:expressscope:eqversion:15.00.00

Trust: 1.6

vendor:teradatamodel:gatewayscope:lteversion:15.00.02.08

Trust: 1.0

vendor:teradatamodel:expressscope:eqversion:15.00.02.08_sles11

Trust: 0.8

vendor:teradatamodel:gatewayscope:eqversion:15.10.00.01-1

Trust: 0.8

vendor:teradatamodel:gatewayscope:ltversion:15.10.x

Trust: 0.8

vendor:teradatamodel:gatewayscope:ltversion:15.00.03.02-1

Trust: 0.6

vendor:teradatamodel:gatewayscope:eqversion:15.10.*<15.10.00.01-1

Trust: 0.6

vendor:teradatamodel:td express <15.00.02.08 sles10scope: - version: -

Trust: 0.6

vendor:teradatamodel:td express <15.00.02.08 sles11scope: - version: -

Trust: 0.6

vendor:teradatamodel:gatewayscope:eqversion:15.00.02.08

Trust: 0.6

vendor:teradatamodel:gatewayscope:eqversion:15.0.1

Trust: 0.3

vendor:teradatamodel:gatewayscope:eqversion:5.10

Trust: 0.3

vendor:teradatamodel:expressscope:eqversion:15.0.1

Trust: 0.3

vendor:teradatamodel:expressscope:eqversion:15.00

Trust: 0.3

vendor:teradatamodel:gatewayscope:neversion:15.10.00.01-1

Trust: 0.3

vendor:teradatamodel:gatewayscope:neversion:15.00.03.02-1

Trust: 0.3

vendor:teradatamodel:express 15.00.02.08 sles11scope:neversion: -

Trust: 0.3

vendor:teradatamodel:express 15.00.02.08 sles10scope:neversion: -

Trust: 0.3

sources: CNVD: CNVD-2017-09374 // BID: 98655 // JVNDB: JVNDB-2015-007566 // CNNVD: CNNVD-201705-1170 // NVD: CVE-2015-5401

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-5401
value: HIGH

Trust: 1.0

NVD: CVE-2015-5401
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-09374
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201705-1170
value: MEDIUM

Trust: 0.6

VULHUB: VHN-83362
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-5401
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-09374
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-83362
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-5401
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-09374 // VULHUB: VHN-83362 // JVNDB: JVNDB-2015-007566 // CNNVD: CNNVD-201705-1170 // NVD: CVE-2015-5401

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-83362 // JVNDB: JVNDB-2015-007566 // NVD: CVE-2015-5401

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201705-1170

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201705-1170

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-007566

PATCH

title:Teradata Vulnerability Announced: Big Potential Headaches For Big Data Solutionurl:http://blog.fortinet.com/2015/07/23/teradata-vulnerability-announced-big-potential-headaches-for-big-data-solution

Trust: 0.8

title:The Teradata Gatewayurl:http://www.info.teradata.com/HTMLPubs/DB_TTU_15_00/index.html#page/Database_Management/B035_1093_015K/1093Chap19.043.42.html

Trust: 0.8

title:Teradata Expressurl:http://www.teradata.jp/products-and-services/teradata-express

Trust: 0.8

title:Patch for TeradataGateway and TDExpress Security Vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/95306

Trust: 0.6

title:Teradata Gateway and TD Express Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=70540

Trust: 0.6

sources: CNVD: CNVD-2017-09374 // JVNDB: JVNDB-2015-007566 // CNNVD: CNNVD-201705-1170

EXTERNAL IDS

db:NVDid:CVE-2015-5401

Trust: 3.4

db:SECTRACKid:1033005

Trust: 2.3

db:JVNDBid:JVNDB-2015-007566

Trust: 0.8

db:CNNVDid:CNNVD-201705-1170

Trust: 0.7

db:CNVDid:CNVD-2017-09374

Trust: 0.6

db:BIDid:98655

Trust: 0.4

db:VULHUBid:VHN-83362

Trust: 0.1

sources: CNVD: CNVD-2017-09374 // VULHUB: VHN-83362 // BID: 98655 // JVNDB: JVNDB-2015-007566 // CNNVD: CNNVD-201705-1170 // NVD: CVE-2015-5401

REFERENCES

url:http://www.fortiguard.com/advisory/fg-vd-15-038/

Trust: 2.3

url:http://www.securitytracker.com/id/1033005

Trust: 2.3

url:https://blog.fortinet.com/2015/07/23/teradata-vulnerability-announced-big-potential-headaches-for-big-data-solution

Trust: 2.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5401

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2015-5401

Trust: 0.8

url:http://www.teradata.com/

Trust: 0.3

sources: CNVD: CNVD-2017-09374 // VULHUB: VHN-83362 // BID: 98655 // JVNDB: JVNDB-2015-007566 // CNNVD: CNNVD-201705-1170 // NVD: CVE-2015-5401

CREDITS

Fortinet's FortiGuard Labs

Trust: 0.3

sources: BID: 98655

SOURCES

db:CNVDid:CNVD-2017-09374
db:VULHUBid:VHN-83362
db:BIDid:98655
db:JVNDBid:JVNDB-2015-007566
db:CNNVDid:CNNVD-201705-1170
db:NVDid:CVE-2015-5401

LAST UPDATE DATE

2025-04-20T23:42:13.750000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-09374date:2017-06-13T00:00:00
db:VULHUBid:VHN-83362date:2017-06-06T00:00:00
db:BIDid:98655date:2017-05-23T00:00:00
db:JVNDBid:JVNDB-2015-007566date:2017-06-26T00:00:00
db:CNNVDid:CNNVD-201705-1170date:2017-05-24T00:00:00
db:NVDid:CVE-2015-5401date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-09374date:2017-06-14T00:00:00
db:VULHUBid:VHN-83362date:2017-05-23T00:00:00
db:BIDid:98655date:2017-05-23T00:00:00
db:JVNDBid:JVNDB-2015-007566date:2017-06-26T00:00:00
db:CNNVDid:CNNVD-201705-1170date:2017-05-24T00:00:00
db:NVDid:CVE-2015-5401date:2017-05-23T04:29:00.727