Total vulnerabilities in the database
The Common Code Infrastructure component in IBM DB2 8 before FP17, 9.1 before FP7, and 9.5 before FP4, when LDAP security (aka IBMLDAPauthserver) and anonymous bind are enabled, allows remote attackers to bypass password authentication and establish a database connection via unspecified vectors.
Software | From | Fixed in |
---|---|---|
ibm / db2 | 8.0-fp11 | 8.0-fp11.x |
ibm / db2 | 8.0-fp10 | 8.0-fp10.x |
ibm / db2 | 9.1-fp1 | 9.1-fp1.x |
ibm / db2 | - | 9.1.x |
ibm / db2 | 9.1-fp3 | 9.1-fp3.x |
ibm / db2 | 8.0-fix_pack15 | 8.0-fix_pack15.x |
ibm / db2 | 9.1-fp3a | 9.1-fp3a.x |
ibm / db2 | 8.0-fp14 | 8.0-fp14.x |
ibm / db2 | - | 8.0.x |
ibm / db2 | 8.0-fp1 | 8.0-fp1.x |
ibm / db2 | 9.1-fp2 | 9.1-fp2.x |
ibm / db2 | - | 9.5.x |
ibm / db2 | 9.1-fp4a | 9.1-fp4a.x |
ibm / db2 | 8.0-fp13 | 8.0-fp13.x |
ibm / db2 | 8.0-fp12 | 8.0-fp12.x |
ibm / db2 | 8.0-fp15 | 8.0-fp15.x |