First published: Mon Jul 10 2023(Updated: )
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 with a Federated configuration is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local user with SYSADM privileges could overflow the buffer and execute arbitrary code on the system. IBM X-Force ID: 257763.
Credit: psirt@us.ibm.com psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM IBM® Db2® | =11.5 | |
IBM AIX | ||
Linux Linux kernel | ||
Microsoft Windows | ||
IBM IBM® Db2® | <=11.5.7 with special build level before s2211170548. The problem first fixed in s2211170548. 11.5.8 with special build level before s2211250928 . The problem first fixed in s2211250928. | |
All of | ||
Ibm Db2 | =11.5 | |
Any of | ||
IBM AIX | ||
Linux Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35012 is a vulnerability in IBM Db2 for Linux, UNIX, and Windows 11.5 with a Federated configuration that allows a local user with SYSADM privileges to overflow a buffer and execute arbitrary code on the system.
CVE-2023-35012 affects IBM Db2 for Linux, UNIX, and Windows 11.5 with a Federated configuration.
CVE-2023-35012 has a severity rating of 6.7, which is considered medium.
The CVE-2023-35012 vulnerability can be exploited by a local user with SYSADM privileges to overflow a buffer and execute arbitrary code on the system.
To fix the CVE-2023-35012 vulnerability, update IBM Db2 for Linux, UNIX, and Windows to version 11.5.7 with special build level s2211170548 or 11.5.8 with special build level s2211250928 or later.