First published: Sun Oct 16 2016(Updated: )
SQL injection vulnerability in IBM Security Guardium Database Activity Monitor 8.2 before p310, 9.x through 9.5 before p700, and 10.x through 10.1 before p100 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM InfoSphere Guardium z/OS | <=8.2 | |
IBM InfoSphere Guardium z/OS | =9.0 | |
IBM InfoSphere Guardium z/OS | =9.1 | |
IBM InfoSphere Guardium z/OS | =9.5 | |
IBM InfoSphere Guardium z/OS | =10.0 | |
IBM InfoSphere Guardium z/OS | =10.0.1 | |
IBM InfoSphere Guardium z/OS | =10.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0249 is classified as a critical severity vulnerability due to its potential to allow remote attackers to execute arbitrary SQL commands.
To address CVE-2016-0249, it is essential to upgrade IBM Security Guardium to the latest patch levels available, specifically p310 for 8.2, p700 for 9.x through 9.5, and p100 for 10.x.
CVE-2016-0249 affects IBM Security Guardium versions 8.2 before p310, versions 9.x through 9.5 before p700, and versions 10.x through 10.1 before p100.
Yes, CVE-2016-0249 can potentially lead to data breaches as it allows unauthorized execution of SQL commands, which may compromise sensitive data.
There are no specific workarounds for CVE-2016-0249; the recommended action is to apply the security updates provided by IBM.