IBM Db2 10.1, 10.5, and 11.1 could allow a remote user to execute arbitrary code caused by installing like named jar files across multiple databases. A user could exploit this by installing a malicious jar file that overwrites the existing like named jar file in another database. IBM X-Force ID: 249205.
2024-01-22T20:15:46.550
2025-06-20T19:15:21.503
Modified
CVSSv3.1: 6.5 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | ibm | db2 | ≤ 10.5.0.11 | Yes |
Application | ibm | db2 | ≤ 11.1.4.7 | Yes |
Application | ibm | db2 | ≤ 11.5.9 | Yes |
Operating System | hp | hp-ux | - | No |
Operating System | ibm | aix | - | No |
Operating System | ibm | linux_on_ibm_z | - | No |
Operating System | linux | linux_kernel | - | No |
Operating System | microsoft | windows | - | No |
Operating System | oracle | solaris | - | No |