Untrusted search path vulnerability in IBM DB2 9.7 through FP11, 10.1 through FP5, 10.5 before FP8, and 11.1 GA on Linux, AIX, and HP-UX allows local users to gain privileges via a Trojan horse library that is accessed by a setuid or setgid program.
                
            References
                    | Link | Resource | 
|---|---|
| http://www-01.ibm.com/support/docview.wss?uid=swg21990061 | Patch Vendor Advisory | 
| http://www-01.ibm.com/support/docview.wss?uid=swg1IT16921 | Vendor Advisory | 
| http://www-01.ibm.com/support/docview.wss?uid=swg1IT17012 | Permissions Required | 
| http://www-01.ibm.com/support/docview.wss?uid=swg1IT17010 | Permissions Required | 
| http://www-01.ibm.com/support/docview.wss?uid=swg1IT17011 | Permissions Required | 
| http://www.securityfocus.com/bid/93012 | |
| http://www.securitytracker.com/id/1036837 | 
Configurations
                    Configuration 1 (hide)
| AND | 
                                
                                
 
  | 
                        
Information
                Published : 2016-09-30 18:59
Updated : 2017-07-29 18:29
NVD link : CVE-2016-5995
Mitre link : CVE-2016-5995
JSON object : View
CWE
                
                    
                        
                        CWE-264
                        
            Permissions, Privileges, and Access Controls
Products Affected
                ibm
- db2
 - aix
 - db2_connect
 
hp
- hp-ux
 
linux
- linux_kernel
 


