solid.exe in IBM solidDB before 4.5.181, 6.0.x before 6.0.1067, 6.1.x and 6.3.x before 6.3.47, and 6.5.x before 6.5.0.3 uses a password-hash length specified by the client, which allows remote attackers to bypass authentication via a short length value.
2011-04-05T15:19:34.947
2025-04-11T00:51:21.963
Deferred
CVSSv2: 9.3 (HIGH)
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.6
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | ibm | soliddb | ≤ 4.5.180 | Yes |
Application | ibm | soliddb | 4.5.167 | Yes |
Application | ibm | soliddb | 4.5.168 | Yes |
Application | ibm | soliddb | 4.5.169 | Yes |
Application | ibm | soliddb | 4.5.173 | Yes |
Application | ibm | soliddb | 4.5.175 | Yes |
Application | ibm | soliddb | 4.5.176 | Yes |
Application | ibm | soliddb | 4.5.178 | Yes |
Application | ibm | soliddb | 4.5.179 | Yes |
Application | ibm | soliddb | 6.0.1060 | Yes |
Application | ibm | soliddb | 6.0.1061 | Yes |
Application | ibm | soliddb | 6.0.1064 | Yes |
Application | ibm | soliddb | 6.0.1065 | Yes |
Application | ibm | soliddb | 6.0.1066 | Yes |
Application | ibm | soliddb | 6.1 | Yes |
Application | ibm | soliddb | 6.1.18 | Yes |
Application | ibm | soliddb | 6.1.20 | Yes |
Application | ibm | soliddb | 6.3.33 | Yes |
Application | ibm | soliddb | 6.3.37 | Yes |
Application | ibm | soliddb | 6.3.38 | Yes |
Application | ibm | soliddb | 6.5.0.0 | Yes |
Application | ibm | soliddb | 6.5.0.1 | Yes |
Application | ibm | soliddb | 6.5.0.2 | Yes |
Application | ibm | soliddb | 6.30.0039 | Yes |
Application | ibm | soliddb | 6.30.0040 | Yes |
Application | ibm | soliddb | 6.30.0044 | Yes |