First published: Tue Nov 27 2018(Updated: )
IBM DB2 for Linux, UNIX and Windows 9.7, 10.1, 10.5., and 11.1 db2pdcfg is vulnerable to a stack based buffer overflow, caused by improper bounds checking which could allow an attacker to execute arbitrary code. IBM X-Force ID: 152462.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Db2 | =9.7 | |
IBM Db2 | =10.1 | |
IBM Db2 | =10.5 | |
IBM Db2 | =11.1 | |
Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1897 is classified as critical due to its potential to allow arbitrary code execution.
To remediate CVE-2018-1897, upgrade to a patched version of IBM DB2 that addresses the stack buffer overflow vulnerability.
CVE-2018-1897 affects IBM DB2 versions 9.7, 10.1, 10.5, and 11.1.
CVE-2018-1897 is caused by improper bounds checking in the db2pdcfg component of IBM DB2.
Yes, CVE-2018-1897 can be exploited remotely by an attacker to execute arbitrary code.