First published: Wed Jun 29 2005(Updated: )
Unknown vulnerability in IBM DB2 8.1.4 through 8.1.9 and 8.2.0 through 8.2.2 allows local users with SELECT privileges to conduct unauthorized activities and insert, update or delete table contents.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Db2 | =8.2.2 | |
Ibm Db2 | =8.1.4 | |
Ibm Db2 | =8.1.7 | |
Ibm Db2 | =8.1.9 | |
Ibm Db2 | =8.1.5 | |
Ibm Db2 | =8.2.1 | |
Ibm Db2 | =8.1.8a | |
Ibm Db2 | =8.1.6 | |
Ibm Db2 | =8.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2073 is considered a serious vulnerability due to the potential for unauthorized access and manipulation of data by local users.
To mitigate CVE-2005-2073, it is recommended to restrict SELECT privileges and apply any available patches or updates from IBM.
CVE-2005-2073 allows local users to conduct unauthorized activities, thereby inserting, updating, or deleting table contents.
CVE-2005-2073 affects IBM DB2 versions 8.1.4 through 8.1.9 and 8.2.0 through 8.2.2.
Local users with SELECT privileges on the affected IBM DB2 versions are at risk due to CVE-2005-2073.