First published: Wed Jul 25 2012(Updated: )
IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote attackers to read arbitrary XML files via the (1) GET_WRAP_CFG_C or (2) GET_WRAP_CFG_C2 stored procedure.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Db2 | =9.1 | |
Ibm Db2 | =9.1.0.1 | |
Ibm Db2 | =9.1.0.2 | |
Ibm Db2 | =9.1.0.2-a | |
Ibm Db2 | =9.1.0.3 | |
Ibm Db2 | =9.1.0.3-a | |
Ibm Db2 | =9.1.0.4 | |
Ibm Db2 | =9.1.0.4-a | |
Ibm Db2 | =9.1.0.5 | |
Ibm Db2 | =9.1.0.6 | |
Ibm Db2 | =9.1.0.6-a | |
Ibm Db2 | =9.1.0.7 | |
Ibm Db2 | =9.1.0.7-a | |
Ibm Db2 | =9.1.0.8 | |
Ibm Db2 | =9.1.0.9 | |
Ibm Db2 | =9.1.0.10 | |
Ibm Db2 | =9.1.0.11 | |
Ibm Db2 | =9.5 | |
Ibm Db2 | =9.5.0.1 | |
Ibm Db2 | =9.5.0.2 | |
Ibm Db2 | =9.5.0.2-a | |
Ibm Db2 | =9.5.0.3 | |
Ibm Db2 | =9.5.0.3-a | |
Ibm Db2 | =9.5.0.3-b | |
Ibm Db2 | =9.5.0.4 | |
Ibm Db2 | =9.5.0.4-a | |
Ibm Db2 | =9.5.0.5 | |
Ibm Db2 | =9.5.0.6-a | |
Ibm Db2 | =9.5.0.7 | |
Ibm Db2 | =9.5.0.8 | |
Ibm Db2 | =9.5.0.9 | |
Ibm Db2 | =9.7 | |
Ibm Db2 | =9.7.0.1 | |
Ibm Db2 | =9.7.0.2 | |
Ibm Db2 | =9.7.0.3 | |
Ibm Db2 | =9.7.0.4 | |
Ibm Db2 | =9.7.0.5 | |
Ibm Db2 | =9.7.0.6 | |
Ibm Db2 | =9.8 | |
Ibm Db2 | =9.8.0.3 | |
Ibm Db2 | =9.8.0.4 | |
Ibm Db2 | =9.8.0.5 | |
Ibm Db2 | =10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.