First published: Tue Oct 05 2010(Updated: )
The Install component in IBM DB2 UDB 9.5 before FP6a on Linux, UNIX, and Windows enforces an unintended limit on password length, which makes it easier for attackers to obtain access via a brute-force attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Db2 | =9.5 | |
IBM Db2 | =9.5-fp1 | |
IBM Db2 | =9.5-fp2 | |
IBM Db2 | =9.5-fp2a | |
IBM Db2 | =9.5-fp3 | |
IBM Db2 | =9.5-fp3a | |
IBM Db2 | =9.5-fp3b | |
IBM Db2 | =9.5-fp4 | |
IBM Db2 | =9.5-fp4a | |
IBM Db2 | =9.5-fp5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3734 is classified as a medium severity vulnerability due to its ability to facilitate brute-force attacks on password authentication.
To mitigate CVE-2010-3734, upgrade to IBM DB2 version 9.5 Fix Pack 6a or later.
CVE-2010-3734 affects IBM DB2 UDB version 9.5 prior to Fix Pack 6a on Linux, UNIX, and Windows systems.
CVE-2010-3734 enables attackers to conduct brute-force attacks more easily due to the unintended password length limit.
There is no official workaround for CVE-2010-3734, so applying the recommended updates is essential.