CVE-2017-1438CVE-2017-1438

Affected configuration(s):

cpe:/a:ibm:db2:9.7
cpe:/a:ibm:db2:9.7.0.1
cpe:/a:ibm:db2:9.7.0.2
cpe:/a:ibm:db2:9.7.0.3
cpe:/a:ibm:db2:9.7.0.4
cpe:/a:ibm:db2:9.7.0.5
cpe:/a:ibm:db2:9.7.0.6
cpe:/a:ibm:db2:9.7.0.7
cpe:/a:ibm:db2:9.7.0.8
cpe:/a:ibm:db2:9.7.0.9
cpe:/a:ibm:db2:9.7.0.9:a
cpe:/a:ibm:db2:9.7.0.10
cpe:/a:ibm:db2:9.7.0.11
cpe:/a:ibm:db2:10.1
cpe:/a:ibm:db2:10.1.0.1
cpe:/a:ibm:db2:10.1.0.2
cpe:/a:ibm:db2:10.1.0.3
cpe:/a:ibm:db2:10.1.0.4
cpe:/a:ibm:db2:10.1.0.5
cpe:/a:ibm:db2:10.5
cpe:/a:ibm:db2:10.5.0.1
cpe:/a:ibm:db2:10.5.0.2
cpe:/a:ibm:db2:10.5.0.3
cpe:/a:ibm:db2:10.5.0.3:a
cpe:/a:ibm:db2:10.5.0.4
cpe:/a:ibm:db2:10.5.0.5
cpe:/a:ibm:db2:10.5.0.6
cpe:/a:ibm:db2:10.5.0.7
cpe:/a:ibm:db2:11.1.0.0
cpe:/a:ibm:db2_connect:9.7
cpe:/a:ibm:db2_connect:9.7.0.1
cpe:/a:ibm:db2_connect:9.7.0.2
cpe:/a:ibm:db2_connect:9.7.0.3
cpe:/a:ibm:db2_connect:9.7.0.4
cpe:/a:ibm:db2_connect:9.7.0.5
cpe:/a:ibm:db2_connect:9.7.0.6
cpe:/a:ibm:db2_connect:9.7.0.7
cpe:/a:ibm:db2_connect:9.7.0.8
cpe:/a:ibm:db2_connect:9.7.0.9
cpe:/a:ibm:db2_connect:9.7.0.10
cpe:/a:ibm:db2_connect:9.7.0.11
cpe:/a:ibm:db2_connect:10.1
cpe:/a:ibm:db2_connect:10.1.0.1
cpe:/a:ibm:db2_connect:10.1.0.2
cpe:/a:ibm:db2_connect:10.1.0.3
cpe:/a:ibm:db2_connect:10.1.0.4
cpe:/a:ibm:db2_connect:10.1.0.5
cpe:/a:ibm:db2_connect:10.5
cpe:/a:ibm:db2_connect:10.5.0.1
cpe:/a:ibm:db2_connect:10.5.0.2
cpe:/a:ibm:db2_connect:10.5.0.3
cpe:/a:ibm:db2_connect:10.5.0.4
cpe:/a:ibm:db2_connect:10.5.0.5
cpe:/a:ibm:db2_connect:10.5.0.6
cpe:/a:ibm:db2_connect:10.5.0.7
cpe:/a:ibm:db2_connect:11.1.0.0

Date published: 2017-09-12T17:29:00.317-04:00

Date last modified: 2017-09-20T14:41:05.017-04:00

CVSS Score: 7.2

Principal attack vector: LOCAL

Complexity:  LOW

Reference URL: http://www.ibm.com/support/docview.wss?uid=swg22006885

Summary: IBM DB2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user with DB2 instance owner privileges to obtain root access. IBM X-Force ID: 128057.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.