First published: Mon Sep 20 2010(Updated: )
IBM DB2 9.7 before FP3 does not perform the expected drops or invalidations of dependent functions upon a loss of privileges by the functions' owners, which allows remote authenticated users to bypass intended access restrictions via calls to these functions, a different vulnerability than CVE-2009-3471.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Db2 | =9.7.0.1 | |
IBM Db2 | =9.7.0.2 | |
IBM Db2 | =9.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3474 is classified as having a medium severity due to its potential for privilege escalation.
To fix CVE-2010-3474, upgrade to IBM DB2 version 9.7 FP3 or later, which addresses this vulnerability.
CVE-2010-3474 affects IBM DB2 versions 9.7.0.1, 9.7.0.2, and 9.7, allowing remote authenticated users access to restricted functions.
CVE-2010-3474 is a privilege escalation vulnerability that allows unauthorized users to bypass access controls.
Yes, CVE-2010-3474 can be exploited remotely by authenticated users who leverage the vulnerability to access restricted functions.