First published: Thu Aug 17 2006(Updated: )
IBM Informix Dynamic Server (IDS) allows remote authenticated users to create and overwrite arbitrary files via the (1) LOTOFILE and (2) trl_tracefile_set functions, and the (3) "SET DEBUG FILE" commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Informix Dynamic Database Server | =9.40.tc7 | |
IBM Informix Dynamic Database Server | =9.40.tc8 | |
IBM Informix Dynamic Database Server | =10.00.tc4 | |
IBM Informix Dynamic Database Server | =10.00.tc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-3859 is classified as high due to the ability of authenticated users to create and overwrite arbitrary files.
To fix CVE-2006-3859, ensure that you are using a patched version of IBM Informix Dynamic Server that mitigates the file creation vulnerabilities.
CVE-2006-3859 affects users of IBM Informix Dynamic Server versions 9.40.tc4, 9.40.tc7, 9.40.tc8, and 10.00.tc4 and tc5.
Yes, CVE-2006-3859 can be exploited remotely by authenticated users to manipulate file systems.
The functions involved in CVE-2006-3859 are LOTOFILE, trl_tracefile_set, and the "SET DEBUG FILE" command.