First published: Fri May 30 2014(Updated: )
Multiple untrusted search path vulnerabilities in unspecified (1) setuid and (2) setgid programs in IBM DB2 9.5, 9.7 before FP9a, 9.8, 10.1 before FP3a, and 10.5 before FP3a on Linux and UNIX allow local users to gain root privileges via a Trojan horse library.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Db2 | =9.5 | |
Ibm Db2 | =9.7 | |
Ibm Db2 | =9.7.0.1 | |
Ibm Db2 | =9.7.0.2 | |
Ibm Db2 | =9.7.0.3 | |
Ibm Db2 | =9.7.0.4 | |
Ibm Db2 | =9.7.0.5 | |
Ibm Db2 | =9.7.0.6 | |
Ibm Db2 | =9.7.0.7 | |
Ibm Db2 | =9.7.0.8 | |
Ibm Db2 | =9.7.0.9 | |
Ibm Db2 | =10.1 | |
Ibm Db2 | =10.1.0.1 | |
Ibm Db2 | =10.1.0.2 | |
Ibm Db2 | =10.1.0.3 | |
Ibm Db2 | =10.5 | |
Ibm Db2 | =10.5.0.1 | |
Ibm Db2 | =10.5.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.