CVE-2008-1998
28.04.2008, 20:05
The NNSTAT (aka SYSPROC.NNSTAT) procedure in IBM DB2 8 before FP16, 9.1 before FP4a, and 9.5 before FP1 on Windows allows remote authenticated users to overwrite arbitrary files via the log file parameter.Enginsight
Vendor | Product | Version |
---|---|---|
ibm | db2 | 8.0:fp1 |
ibm | db2 | 8.0:fp10 |
ibm | db2 | 8.0:fp11 |
ibm | db2 | 8.0:fp12 |
ibm | db2 | 8.0:fp13 |
ibm | db2 | 8.0:fp14 |
ibm | db2 | 8.0:fp15 |
ibm | db2 | 8.0:fp2 |
ibm | db2 | 8.0:fp3 |
ibm | db2 | 8.0:fp4 |
ibm | db2 | 8.0:fp5 |
ibm | db2 | 8.0:fp6 |
ibm | db2 | 8.0:fp6a |
ibm | db2 | 8.0:fp6b |
ibm | db2 | 8.0:fp6c |
ibm | db2 | 8.0:fp7 |
ibm | db2 | 8.0:fp7a |
ibm | db2 | 8.0:fp7b |
ibm | db2 | 8.0:fp8 |
ibm | db2 | 8.0:fp8a |
ibm | db2 | 8.0:fp9 |
ibm | db2 | 8.0:fp9a |
ibm | db2 | 9.1:fp1 |
ibm | db2 | 9.1:fp2 |
ibm | db2 | 9.1:fp3 |
ibm | db2 | 9.1:fp3a |
ibm | db2 | 9.1:fp4 |
ibm | db2 | 9.5 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References