CVE-2014-4805
https://notcve.org/view.php?id=CVE-2014-4805
IBM DB2 10.5 before FP4 on Linux and AIX creates temporary files during CDE table LOAD operations, which allows local users to obtain sensitive information by reading a file while a LOAD is occurring. IBM DB2 10.5 anterior a FP4 en Linux y AIX crea ficheros temporales durante las operaciones CDE table LOAD, lo que permite a usuarios locales obtener información sensible mediante la lectura de un fichero mientras un LOAD está sucediendo. • http://www-01.ibm.com/support/docview.wss?uid=swg1IT03761 http://www-01.ibm.com/support/docview.wss?uid=swg21681723 http://www.securitytracker.com/id/1030806 https://exchange.xforce.ibmcloud.com/vulnerabilities/95307 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2014-3095
https://notcve.org/view.php?id=CVE-2014-3095
The SQL engine in IBM DB2 9.5 through FP10, 9.7 through FP9a, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP4 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) via a crafted UNION clause in a subquery of a SELECT statement. El motor SQL en IBM DB2 9.5 hasta FP10, 9.7 hasta FP9a, 9.8 hasta FP5, 10.1 hasta FP4, y 10.5 anterior a FP4 en Linux, UNIX y Windows permite a usuarios remotos autenticados causar una denegación de servicio (caída del demonio) a través de una clausula UNION manipulada en una subconsulta de una declaración SELECT. • http://secunia.com/advisories/58725 http://secunia.com/advisories/60845 http://www-01.ibm.com/support/docview.wss?uid=swg1IT02433 http://www-01.ibm.com/support/docview.wss?uid=swg1IT02643 http://www-01.ibm.com/support/docview.wss?uid=swg1IT02644 http://www-01.ibm.com/support/docview.wss?uid=swg1IT02645 http://www-01.ibm.com/support/docview.wss? • CWE-20: Improper Input Validation •
CVE-2014-3094
https://notcve.org/view.php?id=CVE-2014-3094
Stack-based buffer overflow in IBM DB2 9.7 through FP9a, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP4 on Linux, UNIX, and Windows allows remote authenticated users to execute arbitrary code via a crafted ALTER MODULE statement. Desbordamiento de buffer basado en pila en IBM DB2 9.7 hasta FP9a, 9.8 hasta FP5, 10.1 hasta FP4, y 10.5 anterior a FP4 en Linux, UNIX y Windows permite a usuarios remotos autenticados ejecutar código arbitrario a través de una declaración ALTER MODULE manipulada. • http://secunia.com/advisories/58616 http://secunia.com/advisories/60845 http://www-01.ibm.com/support/docview.wss?uid=swg1IT02291 http://www-01.ibm.com/support/docview.wss?uid=swg1IT02592 http://www-01.ibm.com/support/docview.wss?uid=swg1IT02593 http://www-01.ibm.com/support/docview.wss?uid=swg1IT02594 http://www-01.ibm.com/support/docview.wss? • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2014-0907
https://notcve.org/view.php?id=CVE-2014-0907
Multiple untrusted search path vulnerabilities in unspecified (1) setuid and (2) setgid programs in IBM DB2 9.5, 9.7 before FP9a, 9.8, 10.1 before FP3a, and 10.5 before FP3a on Linux and UNIX allow local users to gain root privileges via a Trojan horse library. Múltiples vulnerabilidades de búsqueda de ruta no confiable en programas no especificados (1) setuid y (2) setgid en IBM DB2 9.5, 9.7 anterior a FP9a, 9.8, 10.1 anterior a FP3a y 10.5 anterior a FP3a en Linux y UNIX permiten a usuarios locales ganar privilegios root a través de una libraría caballo de troya. • http://packetstormsecurity.com/files/126940/IBM-DB2-Privilege-Escalation.html http://seclists.org/fulldisclosure/2014/Jun/7 http://secunia.com/advisories/59451 http://secunia.com/advisories/59463 http://secunia.com/advisories/60482 http://www-01.ibm.com/support/docview.wss?uid=isg400001841 http://www-01.ibm.com/support/docview.wss?uid=isg400001843 http://www-01.ibm.com/support/docview.wss?uid=swg1IT00627 http://www-01.ibm.com/support/docview.wss?uid=swg1IT00684 http://www-01. •
CVE-2013-6744
https://notcve.org/view.php?id=CVE-2013-6744
The Stored Procedure infrastructure in IBM DB2 9.5, 9.7 before FP9a, 10.1 before FP3a, and 10.5 before FP3a on Windows allows remote authenticated users to gain privileges by leveraging the CONNECT privilege and the CREATE_EXTERNAL_ROUTINE authority. La infraestructura Stored Procedure en IBM DB2 9.5, 9.7 anterior a FP9a, 10.1 anterior a FP3a y 10.5 anterior a FP3a en Windows permite a usuarios remotos autenticados ganar privilegios mediante el aprovechamiento del privilegio CONNECT y la autoridad CREATE_EXTERNAL_ROUTINE. • http://www-01.ibm.com/support/docview.wss?uid=swg1IC98849 http://www-01.ibm.com/support/docview.wss?uid=swg1IC99478 http://www-01.ibm.com/support/docview.wss?uid=swg1IC99480 http://www-01.ibm.com/support/docview.wss?uid=swg1IC99481 http://www.ibm.com/support/docview.wss? • CWE-264: Permissions, Privileges, and Access Controls •