Some vulnerabilities have been reported in IBM DB2, where one has an unknown impact and others can be exploited by malicious users to potentially perform certain actions with escalated privileges, cause a DoS (Denial of Service), to bypass certain security restrictions, or potentially compromise a vulnerable system.
1) An unspecified error can be exploited to insert, update, or delete rows in a table without having required privileges.
2) An unspecified error exists related to a table function when the definer loses required privileges.
These vulnerabilities are reported in DB2 9.1 prior to FP8, DB2 9.5 prior to FP4, and DB2 9.7 prior to FP2.
3) An unspecified error in the handling of "SET SESSION AUTHORIZATION" statements can be exploited to execute this statement without having the required privileges.
This vulnerability is reported in DB2 9.1 prior to FP8.
4) The "DASAUTO" command can be run by non-privileged users.
This security issue is reported in DB2 9.1 prior to FP8 and DB2 9.5 prior to FP4.
5) An error in the implementation of certain DB2 table functions can potentially be exploited to compromise a vulnerable system.
For more information see vulnerability #3 in: SA37454
6) An error when processing malformed db2ra client data streams can be exploited to cause a DoS.
For more information see vulnerability #4 in: SA37454
7) An unspecified error exists in the "db2licm" utility.
For more information see vulnerability #2 in: SA37454
8) An unspecified error exists related to a sequence or global variable object.
For more information see vulnerability #4 in: SA37759
9) An unspecified error can potentially exploited to cause a DoS.
For more information see vulnerability #6 in: SA37759
10) An unspecified error can be exploited to disclose sensitive information.
For more information see vulnerability #7 in: SA37759
Vulnerabilities #5 to #10 are reported in DB2 9.1 prior to FP8.
Solution: Update to DB2 9.1 FP8, DB2 9.5 FP4, and DB2 9.7 FP2.
Provided and/or discovered by: 1 - 4) Reported by the vendor.
5) The vendor credits an anonymous researcher, reported via ZDI.
6) The vendor credits Noa Bar-Yosef of Imperva's ADC.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: IBM DB2 Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.