IBM DB2 8 before FP18, 9.1 before FP8, and 9.5 before FP4 allows remote authenticated users to bypass intended access restrictions, and update, insert, or delete table rows, via unspecified vectors.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/58478 - | |
References | () http://secunia.com/advisories/36890 - Vendor Advisory | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1IZ50074 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1IZ50078 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1IZ50079 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21386689 - Vendor Advisory | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21403619 - | |
References | () http://www.securityfocus.com/bid/36540 - |
Information
Published : 2009-09-29 21:30
Updated : 2024-11-21 01:07
NVD link : CVE-2009-3472
Mitre link : CVE-2009-3472
CVE.ORG link : CVE-2009-3472
JSON object : View
Products Affected
ibm
- db2
CWE
CWE-264
Permissions, Privileges, and Access Controls