First published: Fri Jul 07 2023(Updated: )
IBM Db2 JDBC Driver could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unchecked class instantiation when providing plugin classes. By sending a specially crafted request using the named pluginClassName class, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Credit: psirt@us.ibm.com psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Db2 | =10.5.0.11 | |
Ibm Db2 | =11.1.4.7 | |
IBM IBM® Db2® | =11.5 | |
HP HP-UX | ||
IBM AIX | ||
Linux Linux kernel | ||
Microsoft Windows | ||
Oracle Solaris | ||
<=10.5.0.11 | ||
<=11.1.4.7 | ||
<=11.5.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27868 is a vulnerability in the IBM Db2 JDBC Driver that could allow a remote authenticated attacker to execute arbitrary code on the system.
CVE-2023-27868 affects IBM Db2 versions 10.5.0.11, 11.1.4.7, and 11.5.x.
The severity of CVE-2023-27868 is high with a CVSS score of 8.8.
A remote authenticated attacker can exploit CVE-2023-27868 by sending a specially crafted request using the named plugin classes.
Yes, you can find more information about CVE-2023-27868 at the following references: [Reference 1](https://exchange.xforce.ibmcloud.com/vulnerabilities/249516), [Reference 2](https://www.ibm.com/support/pages/node/7010029), [Reference 3](https://security.netapp.com/advisory/ntap-20230803-0006/)