Untrusted search path vulnerability in IBM DB2 9.7 through FP11, 10.1 through FP5, 10.5 before FP8, and 11.1 GA on Linux, AIX, and HP-UX allows local users to gain privileges via a Trojan horse library that is accessed by a setuid or setgid program.
References
Link | Resource |
---|---|
http://www-01.ibm.com/support/docview.wss?uid=swg21990061 | Patch Vendor Advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg1IT16921 | Vendor Advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg1IT17012 | Permissions Required |
http://www-01.ibm.com/support/docview.wss?uid=swg1IT17010 | Permissions Required |
http://www-01.ibm.com/support/docview.wss?uid=swg1IT17011 | Permissions Required |
http://www.securityfocus.com/bid/93012 | |
http://www.securitytracker.com/id/1036837 |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2016-09-30 18:59
Updated : 2017-07-29 18:29
NVD link : CVE-2016-5995
Mitre link : CVE-2016-5995
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
ibm
- db2
- aix
- db2_connect
hp
- hp-ux
linux
- linux_kernel