First published: Mon Jul 20 2015(Updated: )
IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to read certain administrative files via crafted use of an automated-maintenance policy stored procedure.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Db2 | =9.7 | |
IBM Db2 | =9.7 | |
IBM Db2 | =9.7 | |
IBM Db2 | =9.7 | |
IBM Db2 | =9.7 | |
IBM Db2 | =9.8 | |
IBM Db2 | =9.8 | |
IBM Db2 | =9.8 | |
IBM Db2 | =9.8 | |
IBM Db2 | =9.8 | |
IBM Db2 | =10.1 | |
IBM Db2 | =10.1 | |
IBM Db2 | =10.1 | |
IBM Db2 | =10.1 | |
IBM Db2 | =10.1 | |
IBM Db2 | =10.5 | |
IBM Db2 | =10.5 | |
IBM Db2 | =10.5 | |
IBM Db2 | =10.5 | |
IBM Db2 | =10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1883 has been classified with a medium severity, allowing authenticated users to access sensitive files.
To mitigate CVE-2015-1883, upgrade IBM DB2 to the latest versions above the specified thresholds in its documentation.
CVE-2015-1883 affects IBM DB2 versions 9.7, 9.8, 10.1, and 10.5 across Linux, UNIX, and Windows platforms.
Yes, CVE-2015-1883 can be exploited by remote authenticated users who can execute specific stored procedures.
CVE-2015-1883 allows unauthorized reading of certain administrative files through crafted procedures.