First published: Wed Aug 21 2019(Updated: )
IBM DB2 High Performance Unload load for LUW 6.1, 6.1.0.1, 6.1.0.1 IF1, 6.1.0.2, 6.1.0.2 IF1, and 6.1.0.1 IF2 db2hpum_debug is a setuid root binary which trusts the PATH environment variable. A low privileged user can execute arbitrary commands as root by altering the PATH variable to point to a user controlled location. When a crash is induced the trojan gdb command is executed. IBM X-Force ID: 163488.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM DB2 High Performance Unload load | =6.1 | |
IBM DB2 High Performance Unload load | =6.1.0.1 | |
IBM DB2 High Performance Unload load | =6.1.0.1-if1 | |
IBM DB2 High Performance Unload load | =6.1.0.1-if2 | |
IBM DB2 High Performance Unload load | =6.1.0.2 | |
IBM DB2 High Performance Unload load | =6.1.0.2-if1 | |
Linux Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-4447 is high, with a severity value of 7.8.
The affected software for CVE-2019-4447 is IBM DB2 High Performance Unload load versions 6.1, 6.1.0.1, 6.1.0.1 IF1, 6.1.0.2, 6.1.0.2 IF1, and 6.1.0.1 IF2.
A low privileged user can exploit CVE-2019-4447 by altering the PATH variable to execute arbitrary commands as root.
No, Linux Linux kernel is not vulnerable to CVE-2019-4447.
No, Microsoft Windows is not vulnerable to CVE-2019-4447.