IBM DB2 8 before FP18, 9.1 before FP8, and 9.5 before FP4 allows remote authenticated users to bypass intended access restrictions, and update, insert, or delete table rows, via unspecified vectors.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www-01.ibm.com/support/docview.wss?uid=swg1IZ50078 | vendor advisory |
http://www.securityfocus.com/bid/36540 | vdb entry |
http://secunia.com/advisories/36890 | third party advisory vendor advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg1IZ50074 | vendor advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg1IZ50079 | vendor advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg21403619 | |
http://osvdb.org/58478 | vdb entry |
http://www-01.ibm.com/support/docview.wss?uid=swg21386689 | vendor advisory |