Certain XML functions in IBM DB2 8.1 run with the privileges of DB2 instead of the logged-in user, which allows remote attackers to create or overwrite files via (1) XMLFileFromVarchar or (2) XMLFileFromClob, or read files via (3) XMLVarcharFromFile or (4) XMLClobFromFile.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://marc.info/?l=bugtraq&m=110495620513954&w=2 | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18761 | vdb entry |
http://www.ngssoftware.com/advisories/db205012005I.txt | patch |
http://secunia.com/advisories/12733/ | third party advisory patch vendor advisory |
http://www.securityfocus.com/bid/12170 | vdb entry |