The audit facility in the Security component in IBM DB2 UDB 9.5 before FP6a uses instance-level audit settings to capture connection (aka CONNECT and AUTHENTICATION) events in certain circumstances in which database-level audit settings were intended, which might make it easier for remote attackers to connect without discovery.
References
Link | Resource |
---|---|
ftp://public.dhe.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT | |
http://www-01.ibm.com/support/docview.wss?uid=swg1JR34218 | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:20:56
Updated: 2022-10-03T16:20:56
Reserved: 2022-10-03T00:00:00
Link: CVE-2010-3739
JSON object: View
NVD Information
Status : Analyzed
Published: 2010-10-05T18:00:33.487
Modified: 2010-10-06T04:00:00.000
Link: CVE-2010-3739
JSON object: View
Redhat Information
No data.
CWE