The NNSTAT (aka SYSPROC.NNSTAT) procedure in IBM DB2 8 before FP16, 9.1 before FP4a, and 9.5 before FP1 on Windows allows remote authenticated users to overwrite arbitrary files via the log file parameter.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www-1.ibm.com/support/docview.wss?uid=swg1IZ06976 | vendor advisory |
http://www-1.ibm.com/support/docview.wss?uid=swg1IZ10776 | vendor advisory |
http://www-1.ibm.com/support/docview.wss?uid=swg1IZ06977 | vendor advisory |
http://www.appsecinc.com/resources/alerts/db2/2008-03.shtml | third party advisory |
http://securityreason.com/securityalert/3840 | third party advisory |
http://www.securityfocus.com/archive/1/491073/100/0/threaded | mailing list third party advisory vdb entry |
http://secunia.com/advisories/29784 | third party advisory |
http://www.securityfocus.com/bid/28836 | third party advisory vdb entry |
http://secunia.com/advisories/29022 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41960 | third party advisory vdb entry |