Advisory Published
CVE Published
Updated

CVE-2023-27859: IBM Db2 code execution

First published: Mon Jan 08 2024(Updated: )

IBM Db2 10.1, 10.5, and 11.1 could allow a remote user to execute arbitrary code caused by installing like named jar files across multiple databases. A user could exploit this by installing a malicious jar file that overwrites the existing like named jar file in another database. IBM X-Force ID: 249205.

Credit: psirt@us.ibm.com

Affected SoftwareAffected VersionHow to fix
IBM Data Virtualization on Cloud Pak for Data<=3.0
IBM Watson Query with Cloud Pak for Data<=2.2
IBM Watson Query with Cloud Pak for Data<=2.1
IBM Watson Query with Cloud Pak for Data<=2.0
IBM Data Virtualization on Cloud Pak for Data<=1.8
IBM Data Virtualization on Cloud Pak for Data<=1.7
All of
Any of
IBM DB2 Universal Database>=10.5.0.0<=10.5.0.11
IBM DB2 Universal Database>=11.1.0.0<=11.1.4.7
IBM DB2 Universal Database>=11.5<=11.5.9
Any of
HPE HP-UX
IBM AIX
IBM z/OS Linux
Linux Kernel
Microsoft Windows Operating System
Oracle Solaris and Zettabyte File System (ZFS)

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2023-27859?

    CVE-2023-27859 has been rated as a critical vulnerability due to its potential to allow arbitrary code execution by remote users.

  • How do I fix CVE-2023-27859?

    To mitigate CVE-2023-27859, update to the latest available version of IBM Db2 that resolves this issue.

  • What versions of IBM Db2 are affected by CVE-2023-27859?

    CVE-2023-27859 affects IBM Db2 versions 10.1, 10.5, 11.1, and 11.5.

  • What may happen if I don't address CVE-2023-27859?

    Failure to address CVE-2023-27859 could result in unauthorized remote code execution within your Db2 environment.

  • Can CVE-2023-27859 affect databases on different servers?

    Yes, CVE-2023-27859 allows a malicious user to exploit vulnerable jar file installations across multiple databases, even if they are hosted on different servers.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203