CVE-2009-3472

IBM DB2 8 before FP18, 9.1 before FP8, and 9.5 before FP4 allows remote authenticated users to bypass intended access restrictions, and update, insert, or delete table rows, via unspecified vectors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ibm:db2:8.0:fp1:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:8.0:fp10:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:8.0:fp11:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:8.0:fp12:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:8.0:fp13:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:8.0:fp14:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:8.0:fp15:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:8.0:fp16:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:8.0:fp17:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:8.0:fp2:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:8.0:fp3:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:8.0:fp4:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:8.0:fp5:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:8.0:fp6:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:8.0:fp7:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:8.0:fp8:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:8.0:fp9:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:9.1:fp1:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:9.1:fp2:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:9.1:fp3:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:9.1:fp4:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:9.1:fp5:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:9.1:fp6:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:9.1:fp7:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:9.5:fp1:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:9.5:fp2:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:9.5:fp3:*:*:*:*:*:*

History

No history.

Information

Published : 2009-09-29 21:30

Updated : 2023-12-10 10:51


NVD link : CVE-2009-3472

Mitre link : CVE-2009-3472

CVE.ORG link : CVE-2009-3472


JSON object : View

Products Affected

ibm

  • db2
CWE
CWE-264

Permissions, Privileges, and Access Controls