First published: Sat Oct 22 2016(Updated: )
IBM Security Guardium Database Activity Monitor 8.2 before p310, 9.x through 9.5 before p700, and 10.x through 10.1 before p100 allows local users to obtain administrator privileges for command execution via unspecified vectors.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM InfoSphere Guardium Database Activity Monitoring | =8.2 | |
IBM InfoSphere Guardium Database Activity Monitoring | =9.0 | |
IBM InfoSphere Guardium Database Activity Monitoring | =9.1 | |
IBM InfoSphere Guardium Database Activity Monitoring | =9.5 | |
IBM InfoSphere Guardium Database Activity Monitoring | =10.0 | |
IBM InfoSphere Guardium Database Activity Monitoring | =10.1 | |
IBM InfoSphere Guardium Database Activity Monitoring | =10.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0328 is classified as a critical vulnerability due to the potential for local users to gain administrator privileges.
To fix CVE-2016-0328, update IBM Security Guardium Database Activity Monitor to the latest patched version.
CVE-2016-0328 affects IBM Security Guardium Database Activity Monitor versions 8.2, 9.0 through 9.5 before p700, and 10.0 through 10.1 before p100.
Exploiting CVE-2016-0328 could allow local users to execute commands with elevated administrator privileges.
While the best solution is to apply the patch, restricting local user access may serve as a temporary workaround for CVE-2016-0328.