IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges.
References
Link | Resource |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/187078 | VDB Entry Vendor Advisory |
https://www.ibm.com/support/pages/node/6370025 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/187078 | VDB Entry Vendor Advisory |
https://www.ibm.com/support/pages/node/6370025 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/187078 - VDB Entry, Vendor Advisory | |
References | () https://www.ibm.com/support/pages/node/6370025 - Patch, Vendor Advisory |
Information
Published : 2020-11-19 16:15
Updated : 2024-11-21 05:33
NVD link : CVE-2020-4701
Mitre link : CVE-2020-4701
CVE.ORG link : CVE-2020-4701
JSON object : View
Products Affected
linux
- linux_kernel
microsoft
- windows
ibm
- db2
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')