First published: Wed Feb 01 2017(Updated: )
IBM Security Guardium Database Activity Monitor appliance could allow a local user to inject commands that would be executed as root.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM InfoSphere Guardium z/OS | =8.2 | |
IBM InfoSphere Guardium z/OS | =9.0 | |
IBM InfoSphere Guardium z/OS | =9.1 | |
IBM InfoSphere Guardium z/OS | =9.5 | |
IBM InfoSphere Guardium z/OS | =10.0 | |
IBM InfoSphere Guardium z/OS | =10.0.1 | |
IBM InfoSphere Guardium z/OS | =10.1 | |
IBM InfoSphere Guardium z/OS | =10.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6065 is classified as a high-severity vulnerability.
To fix CVE-2016-6065, you should update the IBM Security Guardium Database Activity Monitor appliance to the latest version.
CVE-2016-6065 affects IBM Security Guardium versions 8.2, 9.0, 9.1, 9.5, 10.0, 10.0.1, 10.1, and 10.1.2.
CVE-2016-6065 specifically allows local users to inject commands, not remote attacks.
CVE-2016-6065 is an injection vulnerability that could lead to command execution as root.