Untrusted search path vulnerability in IBM DB2 9.7 through FP11, 10.1 through FP5, 10.5 before FP8, and 11.1 GA on Linux, AIX, and HP-UX allows local users to gain privileges via a Trojan horse library that is accessed by a setuid or setgid program.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www-01.ibm.com/support/docview.wss?uid=swg1IT17012 | permissions required vendor advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg1IT16921 | vendor advisory |
http://www.securitytracker.com/id/1036837 | vdb entry |
http://www.securityfocus.com/bid/93012 | vdb entry |
http://www-01.ibm.com/support/docview.wss?uid=swg1IT17010 | permissions required vendor advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg21990061 | patch vendor advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg1IT17011 | permissions required vendor advisory |