CVE Vulnerabilities

CVE-2010-3739

Improper Authentication

Published: Oct 05, 2010 | Modified: Oct 06, 2010
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu

The audit facility in the Security component in IBM DB2 UDB 9.5 before FP6a uses instance-level audit settings to capture connection (aka CONNECT and AUTHENTICATION) events in certain circumstances in which database-level audit settings were intended, which might make it easier for remote attackers to connect without discovery.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
Db2_universal_database Ibm * 9.5 (including)
Db2_universal_database Ibm 9.5 (including) 9.5 (including)
Db2_universal_database Ibm 9.5-fp1 (including) 9.5-fp1 (including)
Db2_universal_database Ibm 9.5-fp2 (including) 9.5-fp2 (including)
Db2_universal_database Ibm 9.5-fp2a (including) 9.5-fp2a (including)
Db2_universal_database Ibm 9.5-fp3 (including) 9.5-fp3 (including)
Db2_universal_database Ibm 9.5-fp3a (including) 9.5-fp3a (including)
Db2_universal_database Ibm 9.5-fp3b (including) 9.5-fp3b (including)
Db2_universal_database Ibm 9.5-fp4 (including) 9.5-fp4 (including)
Db2_universal_database Ibm 9.5-fp4a (including) 9.5-fp4a (including)
Db2_universal_database Ibm 9.5-fp5 (including) 9.5-fp5 (including)

Potential Mitigations

References