First published: Tue Apr 05 2011(Updated: )
solid.exe in IBM solidDB before 4.5.181, 6.0.x before 6.0.1067, 6.1.x and 6.3.x before 6.3.47, and 6.5.x before 6.5.0.3 uses a password-hash length specified by the client, which allows remote attackers to bypass authentication via a short length value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM solidDB | =4.5.175 | |
IBM solidDB | =4.5.178 | |
IBM solidDB | =4.5.176 | |
IBM solidDB | <=4.5.180 | |
IBM solidDB | =4.5.179 | |
IBM solidDB | =4.5.167 | |
IBM solidDB | =4.5.173 | |
IBM solidDB | =4.5.169 | |
IBM solidDB | =4.5.168 | |
IBM solidDB | =6.1 | |
IBM solidDB | =6.0.1061 | |
IBM solidDB | =6.0.1060 | |
IBM solidDB | =6.30.0040 | |
IBM solidDB | =6.1.18 | |
IBM solidDB | =6.3.33 | |
IBM solidDB | =6.30.0039 | |
IBM solidDB | =6.0.1064 | |
IBM solidDB | =6.5.0.1 | |
IBM solidDB | =6.1.20 | |
IBM solidDB | =6.0.1066 | |
IBM solidDB | =6.5.0.2 | |
IBM solidDB | =6.3.37 | |
IBM solidDB | =6.5.0.0 | |
IBM solidDB | =6.0.1065 | |
IBM solidDB | =6.3.38 | |
IBM solidDB | =6.30.0044 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.