First published: Fri May 30 2014(Updated: )
Multiple untrusted search path vulnerabilities in unspecified (1) setuid and (2) setgid programs in IBM DB2 9.5, 9.7 before FP9a, 9.8, 10.1 before FP3a, and 10.5 before FP3a on Linux and UNIX allow local users to gain root privileges via a Trojan horse library.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Db2 | =9.5 | |
IBM Db2 | =9.7 | |
IBM Db2 | =9.7.0.1 | |
IBM Db2 | =9.7.0.2 | |
IBM Db2 | =9.7.0.3 | |
IBM Db2 | =9.7.0.4 | |
IBM Db2 | =9.7.0.5 | |
IBM Db2 | =9.7.0.6 | |
IBM Db2 | =9.7.0.7 | |
IBM Db2 | =9.7.0.8 | |
IBM Db2 | =9.7.0.9 | |
IBM Db2 | =10.1 | |
IBM Db2 | =10.1.0.1 | |
IBM Db2 | =10.1.0.2 | |
IBM Db2 | =10.1.0.3 | |
IBM Db2 | =10.5 | |
IBM Db2 | =10.5.0.1 | |
IBM Db2 | =10.5.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-0907 is considered high due to the potential to gain root privileges on affected systems.
To fix CVE-2014-0907, you should update your IBM DB2 to the latest version that includes the security patches addressing these vulnerabilities.
CVE-2014-0907 affects IBM DB2 versions 9.5, 9.7 prior to FP9a, 9.8, 10.1 prior to FP3a, and 10.5 prior to FP3a.
Yes, local users can exploit CVE-2014-0907 to gain unauthorized root privileges on systems running affected versions of IBM DB2.
CVE-2014-0907 contains multiple untrusted search path vulnerabilities in setuid and setgid programs.