First published: Wed Jul 25 2012(Updated: )
Directory traversal vulnerability in the SQLJ.DB2_INSTALL_JAR stored procedure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote attackers to replace JAR files via unspecified vectors.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Db2 | =9.1 | |
Ibm Db2 | =9.1.0.1 | |
Ibm Db2 | =9.1.0.2 | |
Ibm Db2 | =9.1.0.2-a | |
Ibm Db2 | =9.1.0.3 | |
Ibm Db2 | =9.1.0.3-a | |
Ibm Db2 | =9.1.0.4 | |
Ibm Db2 | =9.1.0.4-a | |
Ibm Db2 | =9.1.0.5 | |
Ibm Db2 | =9.1.0.6 | |
Ibm Db2 | =9.1.0.6-a | |
Ibm Db2 | =9.1.0.7 | |
Ibm Db2 | =9.1.0.7-a | |
Ibm Db2 | =9.1.0.8 | |
Ibm Db2 | =9.1.0.9 | |
Ibm Db2 | =9.1.0.10 | |
Ibm Db2 | =9.1.0.11 | |
Ibm Db2 | =9.5 | |
Ibm Db2 | =9.5.0.1 | |
Ibm Db2 | =9.5.0.2 | |
Ibm Db2 | =9.5.0.2-a | |
Ibm Db2 | =9.5.0.3 | |
Ibm Db2 | =9.5.0.3-a | |
Ibm Db2 | =9.5.0.3-b | |
Ibm Db2 | =9.5.0.4 | |
Ibm Db2 | =9.5.0.4-a | |
Ibm Db2 | =9.5.0.5 | |
Ibm Db2 | =9.5.0.6-a | |
Ibm Db2 | =9.5.0.7 | |
Ibm Db2 | =9.5.0.8 | |
Ibm Db2 | =9.5.0.9 | |
Ibm Db2 | =9.7 | |
Ibm Db2 | =9.7.0.1 | |
Ibm Db2 | =9.7.0.2 | |
Ibm Db2 | =9.7.0.3 | |
Ibm Db2 | =9.7.0.4 | |
Ibm Db2 | =9.7.0.5 | |
Ibm Db2 | =9.7.0.6 | |
Ibm Db2 | =9.8 | |
Ibm Db2 | =9.8.0.3 | |
Ibm Db2 | =9.8.0.4 | |
Ibm Db2 | =9.8.0.5 | |
Ibm Db2 | =10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.