Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Service detection >> DB2 JDBC Applet Server Detection


Vulnerability Assessment Details

DB2 JDBC Applet Server Detection

Vulnerability Assessment Summary
Detects a DB2 JDBC Applet Server

Detailed Explanation for this Vulnerability Assessment

Summary :

There is a DB2 JDBC Applet Server listening on the remote host.

Description :

The remote host is running a DB2 JDBC Applet Server. DB2 is a
commercial database from IBM, and the JDBC Applet Server is used by
Java apps and applets to communicate with a DB2 server using the type
3 (a.k.a 'net') driver.

Note that use of this driver has been deprecated since DB2 V8.1.

See also :

http://www.ibm.com/software/data/db2/

Solution :

Stop this service if it is no longer needed or limit incoming traffic
to this port if desired.

Network Security Threat Level:

None

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

NIB Intel PENTIUM III 1.2GHz 256KB L2 Cache Processor 370 Pin
$85.0
NIB Intel PENTIUM III 1.2GHz 256KB L2 Cache Processor 370 Pin pictureAMD A8-4500M Quad-Core 1.9GHz AM4500DEC44HJ OEM CPU C00018 - tested - US Seller
$9.9
AMD A8-4500M Quad-Core 1.9GHz AM4500DEC44HJ OEM CPU C00018 - tested - US Seller pictureAMD K6 2 processor 3D now vintage lapel pin badge
$9.99
AMD K6 2 processor 3D now  vintage lapel pin badge pictureIBM p520 8203-E4A 4U Server with 1x 4.7GHz Power6 CPU, 4Gb RAM - No Hard Drives
$199.99
IBM p520 8203-E4A 4U Server with 1x 4.7GHz Power6 CPU, 4Gb RAM - No Hard Drives picture


Discussions

No Discussions have been posted on this vulnerability.