First published: Mon Jul 01 2019(Updated: )
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 158092.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Db2 | =9.7.0.0 | |
Ibm Db2 | =9.7.0.1 | |
Ibm Db2 | =9.7.0.2 | |
Ibm Db2 | =9.7.0.3 | |
Ibm Db2 | =9.7.0.4 | |
Ibm Db2 | =9.7.0.5 | |
Ibm Db2 | =9.7.0.6 | |
Ibm Db2 | =9.7.0.7 | |
Ibm Db2 | =9.7.0.8 | |
Ibm Db2 | =9.7.0.9 | |
Ibm Db2 | =9.7.0.10 | |
Ibm Db2 | =9.7.0.11 | |
Ibm Db2 | =10.1.0.0 | |
Ibm Db2 | =10.1.0.1 | |
Ibm Db2 | =10.1.0.2 | |
Ibm Db2 | =10.1.0.3 | |
Ibm Db2 | =10.1.0.4 | |
Ibm Db2 | =10.1.0.5 | |
Ibm Db2 | =10.1.0.6 | |
Ibm Db2 | =10.5.0.0 | |
Ibm Db2 | =10.5.0.1 | |
Ibm Db2 | =10.5.0.2 | |
Ibm Db2 | =10.5.0.3 | |
Ibm Db2 | =10.5.0.4 | |
Ibm Db2 | =10.5.0.5 | |
Ibm Db2 | =10.5.0.6 | |
Ibm Db2 | =10.5.0.7 | |
Ibm Db2 | =10.5.0.8 | |
Ibm Db2 | =10.5.0.9 | |
Ibm Db2 | =10.5.0.10 | |
Ibm Db2 | =11.1.0.0 | |
Ibm Db2 | =11.1.1.1 | |
Ibm Db2 | =11.1.2.2 | |
Ibm Db2 | =11.1.3.3 | |
Ibm Db2 | =11.1.4.4 | |
HPE HP-UX | ||
IBM AIX | ||
Linux Kernel | ||
Microsoft Windows | ||
Oracle Solaris SPARC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-4102 is classified as high severity due to its potential to allow attackers to decrypt sensitive information.
To fix CVE-2019-4102, upgrade to a version of IBM DB2 that uses stronger cryptographic algorithms as recommended in the IBM security advisory.
IBM DB2 versions 9.7, 10.1, 10.5, and 11.0 are affected by CVE-2019-4102.
Yes, CVE-2019-4102 can potentially be exploited remotely, allowing unauthorized access to sensitive data.
CVE-2019-4102 puts highly sensitive information at risk due to its use of weaker than expected cryptographic algorithms.