IBM DB2 High Performance Unload Load 6.1.0.1

CPE Details

IBM DB2 High Performance Unload Load 6.1.0.1
6.1.0.1
2020-01-14
18h26 +00:00
2020-01-14
18h26 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:ibm:db2_high_performance_unload_load:6.1.0.1:-:*:*:*:*:*:*

Informations

Vendor

ibm

Product

db2_high_performance_unload_load

Version

6.1.0.1

Update

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2019-4606 2019-12-12 16h30 +00:00 IBM DB2 High Performance Unload load for LUW 6.1 and 6.5 could allow a local attacker to execute arbitrary code on the system, caused by an untrusted search path vulnerability. By using a executable file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 168298.
7.8
Haute
CVE-2019-4448 2019-08-26 14h40 +00:00 IBM DB2 High Performance Unload load for LUW 6.1, 6.1.0.1, 6.1.0.1 IF1, 6.1.0.2, 6.1.0.2 IF1, and 6.1.0.1 IF2 db2hpum and db2hpum_debug binaries are setuid root and have built-in options that allow an low privileged user the ability to load arbitrary db2 libraries from a privileged context. This results in arbitrary code being executed with root authority. IBM X-Force ID: 163489.
7.8
Haute
CVE-2019-4447 2019-08-26 14h40 +00:00 IBM DB2 High Performance Unload load for LUW 6.1, 6.1.0.1, 6.1.0.1 IF1, 6.1.0.2, 6.1.0.2 IF1, and 6.1.0.1 IF2 db2hpum_debug is a setuid root binary which trusts the PATH environment variable. A low privileged user can execute arbitrary commands as root by altering the PATH variable to point to a user controlled location. When a crash is induced the trojan gdb command is executed. IBM X-Force ID: 163488.
7.8
Haute