First published: Fri Oct 21 2016(Updated: )
IBM Security Guardium Database Activity Monitor 8.2 before p310, 9.x through 9.5 before p700, and 10.x through 10.1 before p100 allows remote authenticated users to execute arbitrary commands with root privileges via the search field.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM InfoSphere Guardium Database Activity Monitoring | =8.2 | |
IBM InfoSphere Guardium Database Activity Monitoring | =9.0 | |
IBM InfoSphere Guardium Database Activity Monitoring | =9.1 | |
IBM InfoSphere Guardium Database Activity Monitoring | =9.5 | |
IBM InfoSphere Guardium Database Activity Monitoring | =10.0 | |
IBM InfoSphere Guardium Database Activity Monitoring | =10.1 | |
IBM InfoSphere Guardium Database Activity Monitoring | =10.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0236 is classified as a high severity vulnerability due to its potential for remote authenticated users to execute arbitrary commands with root privileges.
To fix CVE-2016-0236, update IBM Security Guardium Database Activity Monitor to versions 8.2 p310, 9.5 p700, or 10.1 p100 or later.
CVE-2016-0236 affects IBM Security Guardium Database Activity Monitor versions 8.2 before p310, 9.x before p700, and 10.x before p100.
An attacker exploiting CVE-2016-0236 could execute arbitrary commands with root privileges on affected systems.
CVE-2016-0236 is considered a remote vulnerability as it can be exploited by authenticated users from outside the target system.