Vulnerabilities > IBM > DB2 > 9.7.0.9

DATE CVE VULNERABILITY TITLE RISK
2019-04-03 CVE-2018-1936 Out-of-bounds Write vulnerability in IBM DB2
IBM DB2 9.7, 10.1, 10.5, and 11.1 libdb2e.so.1 is vulnerable to a stack based buffer overflow, caused by improper bounds checking which could allow an attacker to execute arbitrary code.
local
low complexity
ibm linux microsoft CWE-787
7.2
2017-09-12 CVE-2017-1520 Improper Authentication vulnerability in IBM DB2 and DB2 Connect
IBM DB2 9.7, 10,1, 10.5, and 11.1 is vulnerable to an unauthorized command that allows the database to be activated when authentication type is CLIENT.
4.3
2017-09-12 CVE-2017-1452 Unspecified vulnerability in IBM DB2 and DB2 Connect
IBM DB2 for Linux, UNIX and Windows 9.7, 10,1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user to obtain elevated privilege and overwrite DB2 files.
local
low complexity
ibm linux microsoft
7.2
2017-09-12 CVE-2017-1451 Unspecified vulnerability in IBM DB2 and DB2 Connect
IBM DB2 for Linux, UNIX and Windows 9.7, 10,1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user with DB2 instance owner privileges to obtain root access.
local
low complexity
ibm linux microsoft
7.2
2017-09-12 CVE-2017-1439 Unspecified vulnerability in IBM DB2 and DB2 Connect
IBM DB2 for Linux, UNIX and Windows 9.7, 10,1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user with DB2 instance owner privileges to obtain root access.
local
low complexity
ibm linux microsoft
7.2
2017-09-12 CVE-2017-1438 Unspecified vulnerability in IBM DB2 and DB2 Connect
IBM DB2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user with DB2 instance owner privileges to obtain root access.
local
low complexity
ibm linux microsoft
7.2
2016-10-01 CVE-2016-5995 Permissions, Privileges, and Access Controls vulnerability in IBM DB2 and DB2 Connect
Untrusted search path vulnerability in IBM DB2 9.7 through FP11, 10.1 through FP5, 10.5 before FP8, and 11.1 GA on Linux, AIX, and HP-UX allows local users to gain privileges via a Trojan horse library that is accessed by a setuid or setgid program.
6.9
2016-04-28 CVE-2016-0211 Improper Input Validation vulnerability in IBM DB2 and DB2 Connect
IBM DB2 9.7 through FP11, 9.8, 10.1 through FP5, and 10.5 through FP7 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) via a crafted DRDA message.
network
low complexity
ibm CWE-20
4.0
2014-09-04 CVE-2014-3095 Improper Input Validation vulnerability in IBM DB2
The SQL engine in IBM DB2 9.5 through FP10, 9.7 through FP9a, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP4 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) via a crafted UNION clause in a subquery of a SELECT statement.
3.5
2014-09-04 CVE-2014-3094 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in IBM DB2
Stack-based buffer overflow in IBM DB2 9.7 through FP9a, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP4 on Linux, UNIX, and Windows allows remote authenticated users to execute arbitrary code via a crafted ALTER MODULE statement.
8.5