First published: Thu Jul 22 2010(Updated: )
solid.exe in IBM solidDB before 6.5 FP2 allows remote attackers to execute arbitrary code via a long username field in the first handshake packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM solidDB | =4.5.175 | |
IBM solidDB | =6.1 | |
IBM solidDB | =6.0.1061 | |
IBM solidDB | =6.0.1060 | |
IBM solidDB | =6.30.0040 | |
IBM solidDB | =06.00.1018 | |
IBM solidDB | =6.3.33 | |
IBM solidDB | =4.5.178 | |
IBM solidDB | =4.5.176 | |
IBM solidDB | =6.30.0039 | |
IBM solidDB | =6.0.1064 | |
IBM solidDB | <=6.5.0.1 | |
IBM solidDB | =4.5.167 | |
IBM solidDB | =6.1.20 | |
IBM solidDB | =6.0.1066 | |
IBM solidDB | =4.5.173 | |
IBM solidDB | =4.5.169 | |
IBM solidDB | =4.5.168 | |
IBM solidDB | =6.3.37 | |
IBM solidDB | =6.5.0.0 | |
IBM solidDB | =6.0.1065 | |
IBM solidDB | =6.30.0044 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2771 is rated as critical due to its potential for remote code execution.
To mitigate CVE-2010-2771, upgrade to IBM solidDB version 6.5 FP2 or later.
CVE-2010-2771 impacts IBM solidDB versions including 4.5.175, 6.1, 6.0.1060, and several others prior to 6.5 FP2.
Yes, CVE-2010-2771 can be exploited remotely due to its vulnerability in the username handling during the handshake.
Exploitation of CVE-2010-2771 can lead to arbitrary code execution on the vulnerable server.