Описание
IBM DB2 7.1 and 8.1 allow the bin user to gain root privileges by modifying the shared libraries that are used in setuid root programs.
Ссылки
- ExploitPatchVendor Advisory
- ExploitPatchVendor Advisory
- ExploitPatchVendor Advisory
- ExploitPatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:ibm:db2:9.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:db2_universal_database:6.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:db2_universal_database:7.0:*:linux:*:*:*:*:*
cpe:2.3:a:ibm:db2_universal_database:7.1:*:linux:*:*:*:*:*
cpe:2.3:a:ibm:db2_universal_database:7.2:*:linux:*:*:*:*:*
cpe:2.3:a:ibm:db2_universal_database:8.0:*:linux:*:*:*:*:*
cpe:2.3:a:ibm:db2_universal_database:8.1:*:aix:*:*:*:*:*
cpe:2.3:a:ibm:db2_universal_database:8.2:*:windows:*:*:*:*:*
EPSS
Процентиль: 58%
0.00373
Низкий
7.2 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
IBM DB2 7.1 and 8.1 allow the bin user to gain root privileges by modifying the shared libraries that are used in setuid root programs.
EPSS
Процентиль: 58%
0.00373
Низкий
7.2 High
CVSS2
Дефекты
NVD-CWE-Other