CNVD-2019-30149
Vulnerability from cnvd - Published: 2019-09-04
VLAI Severity ?
Title
IBM DB2 High Performance Unload权限提升漏洞
Description
IBM DB2等都是美国IBM公司的产品。DB2是一套关系型数据库管理系统。Opera Software Opera等都是挪威欧朋(Opera Software)公司的产品。Opera是一款Web浏览器,IBM DB2是一套关系型数据库管理系统。
IBM DB2 High Performance Unload处理PATH存在权限提升漏洞,攻击者可利用该漏洞root用户身份执行任意代码。
Severity
高
Patch Name
IBM DB2 High Performance Unload权限提升漏洞的补丁
Patch Description
IBM DB2等都是美国IBM公司的产品。DB2是一套关系型数据库管理系统。Opera Software Opera等都是挪威欧朋(Opera Software)公司的产品。Opera是一款Web浏览器,IBM DB2是一套关系型数据库管理系统。
IBM DB2 High Performance Unload处理PATH存在权限提升漏洞,攻击者可利用该漏洞root用户身份执行任意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://www-01.ibm.com/support/docview.wss?uid=ibm10964592
Reference
https://www-01.ibm.com/support/docview.wss?uid=ibm10964592
Impacted products
| Name | ['IBM DB2 High Performance Unload load for LUW 6.1', 'IBM DB2 High Performance Unload load for LUW 6.1.0.1', 'IBM DB2 High Performance Unload load for LUW 6.1.0.1 IF1', 'IBM DB2 High Performance Unload load for LUW 6.1.0.2', 'IBM DB2 High Performance Unload load for LUW 6.1.0.2 IF1', 'IBM DB2 High Performance Unload load for LUW 6.1.0.2 IF2'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2019-4448",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2019-4448"
}
},
"description": "IBM DB2\u7b49\u90fd\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4ea7\u54c1\u3002DB2\u662f\u4e00\u5957\u5173\u7cfb\u578b\u6570\u636e\u5e93\u7ba1\u7406\u7cfb\u7edf\u3002Opera Software Opera\u7b49\u90fd\u662f\u632a\u5a01\u6b27\u670b\uff08Opera Software\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Opera\u662f\u4e00\u6b3eWeb\u6d4f\u89c8\u5668\uff0cIBM DB2\u662f\u4e00\u5957\u5173\u7cfb\u578b\u6570\u636e\u5e93\u7ba1\u7406\u7cfb\u7edf\u3002\n\nIBM DB2 High Performance Unload\u5904\u7406PATH\u5b58\u5728\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1eroot\u7528\u6237\u8eab\u4efd\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"discovererName": "Rich Mirch",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www-01.ibm.com/support/docview.wss?uid=ibm10964592",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-30149",
"openTime": "2019-09-04",
"patchDescription": "IBM DB2\u7b49\u90fd\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4ea7\u54c1\u3002DB2\u662f\u4e00\u5957\u5173\u7cfb\u578b\u6570\u636e\u5e93\u7ba1\u7406\u7cfb\u7edf\u3002Opera Software Opera\u7b49\u90fd\u662f\u632a\u5a01\u6b27\u670b\uff08Opera Software\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Opera\u662f\u4e00\u6b3eWeb\u6d4f\u89c8\u5668\uff0cIBM DB2\u662f\u4e00\u5957\u5173\u7cfb\u578b\u6570\u636e\u5e93\u7ba1\u7406\u7cfb\u7edf\u3002\r\n\r\nIBM DB2 High Performance Unload\u5904\u7406PATH\u5b58\u5728\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1eroot\u7528\u6237\u8eab\u4efd\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "IBM DB2 High Performance Unload\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"IBM DB2 High Performance Unload load for LUW 6.1",
"IBM DB2 High Performance Unload load for LUW 6.1.0.1",
"IBM DB2 High Performance Unload load for LUW 6.1.0.1 IF1",
"IBM DB2 High Performance Unload load for LUW 6.1.0.2",
"IBM DB2 High Performance Unload load for LUW 6.1.0.2 IF1",
"IBM DB2 High Performance Unload load for LUW 6.1.0.2 IF2"
]
},
"referenceLink": "https://www-01.ibm.com/support/docview.wss?uid=ibm10964592",
"serverity": "\u9ad8",
"submitTime": "2019-08-30",
"title": "IBM DB2 High Performance Unload\u6743\u9650\u63d0\u5347\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…