Total vulnerabilities in the database
The Security component in IBM DB2 UDB 9.5 before FP6a logs AUDIT events by using a USERID and an AUTHID value corresponding to the instance owner, instead of a USERID and an AUTHID value corresponding to the logged-in user account, which makes it easier for remote authenticated users to execute Audit administration commands without discovery.
Software | From | Fixed in |
---|---|---|
ibm / db2 | 9.5 | 9.5.x |
ibm / db2 | 9.5-fp4 | 9.5-fp4.x |
ibm / db2 | 9.5-fp5 | 9.5-fp5.x |
ibm / db2 | 9.5-fp4a | 9.5-fp4a.x |
ibm / db2 | 9.5-fp1 | 9.5-fp1.x |
ibm / db2 | 9.5-fp2a | 9.5-fp2a.x |
ibm / db2 | 9.5-fp3b | 9.5-fp3b.x |
ibm / db2 | 9.5-fp2 | 9.5-fp2.x |
ibm / db2 | 9.5-fp3 | 9.5-fp3.x |
ibm / db2 | 9.5-fp3a | 9.5-fp3a.x |