Описание
The Data Movement implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to bypass intended access restrictions and delete table rows via unspecified vectors.
The Data Movement implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to bypass intended access restrictions and delete table rows via unspecified vectors.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2015-1922
- http://www-01.ibm.com/support/docview.wss?uid=swg1IT08523
- http://www-01.ibm.com/support/docview.wss?uid=swg1IT08524
- http://www-01.ibm.com/support/docview.wss?uid=swg1IT08525
- http://www-01.ibm.com/support/docview.wss?uid=swg1IT08526
- http://www-01.ibm.com/support/docview.wss?uid=swg21959650
- http://www.securityfocus.com/bid/75911
- http://www.securitytracker.com/id/1032879
Связанные уязвимости
The Data Movement implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to bypass intended access restrictions and delete table rows via unspecified vectors.
The Data Movement implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to bypass intended access restrictions and delete table rows via unspecified vectors.
Уязвимость системы управления базами данных IBM DB2, позволяющая нарушителю обойти существующие ограничения доступа и удалять произвольные строки таблиц