Multiple untrusted search path vulnerabilities in unspecified (1) setuid and (2) setgid programs in IBM DB2 9.5, 9.7 before FP9a, 9.8, 10.1 before FP3a, and 10.5 before FP3a on Linux and UNIX allow local users to gain root privileges via a Trojan horse library.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Db2 | Ibm | 9.5 (including) | 9.5 (including) |
Db2 | Ibm | 9.7 (including) | 9.7 (including) |
Db2 | Ibm | 9.7.0.1 (including) | 9.7.0.1 (including) |
Db2 | Ibm | 9.7.0.2 (including) | 9.7.0.2 (including) |
Db2 | Ibm | 9.7.0.3 (including) | 9.7.0.3 (including) |
Db2 | Ibm | 9.7.0.4 (including) | 9.7.0.4 (including) |
Db2 | Ibm | 9.7.0.5 (including) | 9.7.0.5 (including) |
Db2 | Ibm | 9.7.0.6 (including) | 9.7.0.6 (including) |
Db2 | Ibm | 9.7.0.7 (including) | 9.7.0.7 (including) |
Db2 | Ibm | 9.7.0.8 (including) | 9.7.0.8 (including) |
Db2 | Ibm | 9.7.0.9 (including) | 9.7.0.9 (including) |
Db2 | Ibm | 10.1 (including) | 10.1 (including) |
Db2 | Ibm | 10.1.0.1 (including) | 10.1.0.1 (including) |
Db2 | Ibm | 10.1.0.2 (including) | 10.1.0.2 (including) |
Db2 | Ibm | 10.1.0.3 (including) | 10.1.0.3 (including) |
Db2 | Ibm | 10.5 (including) | 10.5 (including) |
Db2 | Ibm | 10.5.0.1 (including) | 10.5.0.1 (including) |
Db2 | Ibm | 10.5.0.2 (including) | 10.5.0.2 (including) |