First published: Sat Dec 31 2005(Updated: )
IBM DB2 Universal Database (UDB) 810 before ESE AIX 5765F4100 does not ensure that a user has execute privileges before permitting object creation based on routines, which allows remote authenticated users to gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM DB2 Universal Database | =8.1.4 | |
IBM DB2 Universal Database | =8.1.6 | |
IBM DB2 Universal Database | =8.1 | |
IBM DB2 Universal Database | =8.1.8a | |
IBM DB2 Universal Database | =8.1.6c | |
IBM DB2 Universal Database | =8.1.8 | |
IBM DB2 Universal Database | =8.1.7b | |
IBM DB2 Universal Database | =8.0 | |
IBM DB2 Universal Database | =8.1.5 | |
IBM DB2 Universal Database | =8.1.7 | |
IBM DB2 Universal Database | =8.1.9a | |
IBM DB2 Universal Database | =8.1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4738 has been classified as a high-severity vulnerability due to its potential to allow privilege escalation for remote authenticated users.
To mitigate CVE-2005-4738, ensure you apply all relevant patches from IBM for DB2 Universal Database versions 8.1.x before performing routine object creation.
CVE-2005-4738 affects IBM DB2 Universal Database versions 8.0, 8.1.4, 8.1.5, 8.1.6, 8.1.6c, 8.1.7, 8.1.7b, 8.1.8, 8.1.9, and related variants.
CVE-2005-4738 can be exploited by remote authenticated users who have access to the DB2 Universal Database application.
CVE-2005-4738 is a privilege escalation vulnerability that occurs due to improper privilege checks before allowing object creation in IBM DB2.