First published: Mon Mar 11 2019(Updated: )
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 is vulnerable to a buffer overflow, which could allow an authenticated local attacker to execute arbitrary code on the system as root. IBM X-ForceID: 155894.
Credit: psirt@us.ibm.com psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
IBM DB2 Universal Database | =9.7 | |
IBM DB2 Universal Database | =10.1 | |
IBM DB2 Universal Database | =10.5 | |
IBM DB2 Universal Database | =11.1 | |
Linux Kernel | ||
All of | ||
Any of | ||
IBM DB2 Universal Database | =9.7 | |
IBM DB2 Universal Database | =10.1 | |
IBM DB2 Universal Database | =10.5 | |
IBM DB2 Universal Database | =11.1 | |
Microsoft Windows Operating System | ||
IBM DB2 Universal Database | =9.7 | |
IBM DB2 Universal Database | =10.1 | |
IBM DB2 Universal Database | =10.5 | |
IBM DB2 Universal Database | =11.1 | |
Linux Kernel | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-4016 has a high severity rating due to its potential to allow authenticated local attackers to execute arbitrary code on the system.
To fix CVE-2019-4016, update IBM DB2 to the latest version provided by IBM, which contains the necessary security patches.
CVE-2019-4016 affects users running IBM DB2 versions 9.7, 10.1, 10.5, and 11.1 on Linux, UNIX, and Windows.
CVE-2019-4016 can facilitate a local buffer overflow attack, allowing unauthorized execution of code at the root level.
No, CVE-2019-4016 requires authenticated local access for exploitation, meaning remote attacks are not feasible.