The RAND scalar function in the Common Code Infrastructure component in IBM DB2 9.5 before FP5 and 9.7 before FP1, when the Database Partitioning Feature (DPF) is used, produces "repeating" return values, which might allow attackers to defeat protection mechanisms based on randomization by predicting a value.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www-01.ibm.com/support/docview.wss?uid=swg1IC63946 | vendor advisory |
ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v97/APARLIST.TXT | |
ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT | |
http://www-01.ibm.com/support/docview.wss?uid=swg21293566 | patch |
http://www-01.ibm.com/support/docview.wss?uid=swg1IZ44872 | vendor advisory |
http://www.vupen.com/english/advisories/2009/3520 | vdb entry vendor advisory |
http://www.securityfocus.com/bid/37332 | vdb entry |
http://www-01.ibm.com/support/docview.wss?uid=swg21412902 | vendor advisory |
http://secunia.com/advisories/37759 | third party advisory vendor advisory |