Untrusted search path vulnerability in IBM InfoSphere BigInsights 3.0, 3.0.0.1, 3.0.0.2, and 4.0, when a DB2 database is used, allows local users to gain privileges via a Trojan horse library that is loaded by a setuid or setgid program.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Infosphere_biginsights | Ibm | 3.0.0.0 (including) | 3.0.0.0 (including) |
Infosphere_biginsights | Ibm | 3.0.0.1 (including) | 3.0.0.1 (including) |
Infosphere_biginsights | Ibm | 3.0.0.2 (including) | 3.0.0.2 (including) |
Infosphere_biginsights | Ibm | 4.0.0.0 (including) | 4.0.0.0 (including) |