Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2007-4272

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-18 Aug, 2007 | 21:00
Updated At-07 Aug, 2024 | 14:46
Rejected At-
Credits

Multiple vulnerabilities in IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 allow local users to create arbitrary files via (1) unspecified vectors where an attacker's umask is honored, (2) /etc/ld.so.preload, (3) certain "cron data file locations", and other unspecified vectors possibly involving the (4) OSSEMEMDBG or (5) TRC_LOG_FILE environment variable in db2licd (db2licm).

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:18 Aug, 2007 | 21:00
Updated At:07 Aug, 2024 | 14:46
Rejected At:
▼CVE Numbering Authority (CNA)

Multiple vulnerabilities in IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 allow local users to create arbitrary files via (1) unspecified vectors where an attacker's umask is honored, (2) /etc/ld.so.preload, (3) certain "cron data file locations", and other unspecified vectors possibly involving the (4) OSSEMEMDBG or (5) TRC_LOG_FILE environment variable in db2licd (db2licm).

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www-1.ibm.com/support/docview.wss?uid=swg21255607
x_refsource_CONFIRM
http://www.attrition.org/pipermail/vim/2007-August/001765.html
mailing-list
x_refsource_VIM
http://www.vupen.com/english/advisories/2007/2912
vdb-entry
x_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilities/36104
vdb-entry
x_refsource_XF
http://www-1.ibm.com/support/docview.wss?uid=swg1IY98210
vendor-advisory
x_refsource_AIXAPAR
http://www.securityfocus.com/bid/25339
vdb-entry
x_refsource_BID
http://www-1.ibm.com/support/docview.wss?uid=swg21255352
x_refsource_CONFIRM
http://securitytracker.com/id?1018581
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/26471
third-party-advisory
x_refsource_SECUNIA
http://www-1.ibm.com/support/docview.wss?uid=swg1IY98101
vendor-advisory
x_refsource_AIXAPAR
http://www-1.ibm.com/support/docview.wss?uid=swg1IY98011
vendor-advisory
x_refsource_AIXAPAR
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=580
third-party-advisory
x_refsource_IDEFENSE
Hyperlink: http://www-1.ibm.com/support/docview.wss?uid=swg21255607
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.attrition.org/pipermail/vim/2007-August/001765.html
Resource:
mailing-list
x_refsource_VIM
Hyperlink: http://www.vupen.com/english/advisories/2007/2912
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/36104
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www-1.ibm.com/support/docview.wss?uid=swg1IY98210
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://www.securityfocus.com/bid/25339
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www-1.ibm.com/support/docview.wss?uid=swg21255352
Resource:
x_refsource_CONFIRM
Hyperlink: http://securitytracker.com/id?1018581
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/26471
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-1.ibm.com/support/docview.wss?uid=swg1IY98101
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://www-1.ibm.com/support/docview.wss?uid=swg1IY98011
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=580
Resource:
third-party-advisory
x_refsource_IDEFENSE
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www-1.ibm.com/support/docview.wss?uid=swg21255607
x_refsource_CONFIRM
x_transferred
http://www.attrition.org/pipermail/vim/2007-August/001765.html
mailing-list
x_refsource_VIM
x_transferred
http://www.vupen.com/english/advisories/2007/2912
vdb-entry
x_refsource_VUPEN
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/36104
vdb-entry
x_refsource_XF
x_transferred
http://www-1.ibm.com/support/docview.wss?uid=swg1IY98210
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://www.securityfocus.com/bid/25339
vdb-entry
x_refsource_BID
x_transferred
http://www-1.ibm.com/support/docview.wss?uid=swg21255352
x_refsource_CONFIRM
x_transferred
http://securitytracker.com/id?1018581
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/26471
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-1.ibm.com/support/docview.wss?uid=swg1IY98101
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://www-1.ibm.com/support/docview.wss?uid=swg1IY98011
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=580
third-party-advisory
x_refsource_IDEFENSE
x_transferred
Hyperlink: http://www-1.ibm.com/support/docview.wss?uid=swg21255607
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.attrition.org/pipermail/vim/2007-August/001765.html
Resource:
mailing-list
x_refsource_VIM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2912
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/36104
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www-1.ibm.com/support/docview.wss?uid=swg1IY98210
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://www.securityfocus.com/bid/25339
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www-1.ibm.com/support/docview.wss?uid=swg21255352
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://securitytracker.com/id?1018581
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/26471
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-1.ibm.com/support/docview.wss?uid=swg1IY98101
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://www-1.ibm.com/support/docview.wss?uid=swg1IY98011
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=580
Resource:
third-party-advisory
x_refsource_IDEFENSE
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:18 Aug, 2007 | 21:17
Updated At:29 Jul, 2017 | 01:32

Multiple vulnerabilities in IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 allow local users to create arbitrary files via (1) unspecified vectors where an attacker's umask is honored, (2) /etc/ld.so.preload, (3) certain "cron data file locations", and other unspecified vectors possibly involving the (4) OSSEMEMDBG or (5) TRC_LOG_FILE environment variable in db2licd (db2licm).

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.01.9LOW
AV:L/AC:M/Au:N/C:N/I:P/A:N
Type: Primary
Version: 2.0
Base score: 1.9
Base severity: LOW
Vector:
AV:L/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

IBM Corporation
ibm
>>db2_universal_database>>Versions up to 8.0(inclusive)
cpe:2.3:a:ibm:db2_universal_database:*:fp14:*:*:*:*:*:*
IBM Corporation
ibm
>>db2_universal_database>>Versions up to 9.1(inclusive)
cpe:2.3:a:ibm:db2_universal_database:*:*:fp2:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=580cve@mitre.org
N/A
http://secunia.com/advisories/26471cve@mitre.org
Patch
Vendor Advisory
http://securitytracker.com/id?1018581cve@mitre.org
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg1IY98011cve@mitre.org
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg1IY98101cve@mitre.org
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg1IY98210cve@mitre.org
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg21255352cve@mitre.org
Patch
http://www-1.ibm.com/support/docview.wss?uid=swg21255607cve@mitre.org
Patch
http://www.attrition.org/pipermail/vim/2007-August/001765.htmlcve@mitre.org
N/A
http://www.securityfocus.com/bid/25339cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2007/2912cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/36104cve@mitre.org
N/A
Hyperlink: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=580
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/26471
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://securitytracker.com/id?1018581
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-1.ibm.com/support/docview.wss?uid=swg1IY98011
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-1.ibm.com/support/docview.wss?uid=swg1IY98101
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-1.ibm.com/support/docview.wss?uid=swg1IY98210
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www-1.ibm.com/support/docview.wss?uid=swg21255352
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://www-1.ibm.com/support/docview.wss?uid=swg21255607
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://www.attrition.org/pipermail/vim/2007-August/001765.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/25339
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2912
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/36104
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

6Records found

CVE-2015-7435
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-2.5||LOW
EPSS-0.05% / 13.44%
||
7 Day CHG~0.00%
Published-02 Jan, 2016 | 21:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Tivoli Common Reporting (TCR) 2.1 before IF14, 2.1.1 before IF22, 2.1.1.2 before IF9, 3.1.0.0 through 3.1.2 as used in Cognos Business Intelligence before 10.2 IF16, and 3.1.2.1 as used in Cognos Business Intelligence before 10.2.1.1 IF12 allows local users to bypass the Cognos Application Firewall (CAF) protection mechanism via leading whitespace in the BackURL field.

Action-Not Available
Vendor-n/aIBM Corporation
Product-tivoli_common_reportingn/a
CVE-2021-29671
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-4||MEDIUM
EPSS-0.04% / 10.17%
||
7 Day CHG~0.00%
Published-09 Apr, 2021 | 16:45
Updated-16 Sep, 2024 | 20:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Spectrum Scale 5.1.0.1 could allow a local attacker to bypass the filesystem audit logging mechanism when file audit logging is enabled. IBM X-Force ID: 199478.

Action-Not Available
Vendor-IBM Corporation
Product-spectrum_scaleSpectrum Scale
CVE-2014-6195
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-1.9||LOW
EPSS-0.03% / 8.36%
||
7 Day CHG~0.00%
Published-14 Feb, 2015 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) Java GUI and (2) Web GUI components in the IBM Tivoli Storage Manager (TSM) Backup-Archive client 5.4 and 5.5 before 5.5.4.4 on AIX, Linux, and Solaris; 5.4.x and 5.5.x on Windows and z/OS; 6.1 before 6.1.5.7 on z/OS; 6.1 and 6.2 before 6.2.5.2 on Windows, before 6.2.5.3 on AIX and Linux x86, and before 6.2.5.4 on Linux Z and Solaris; 6.3 before 6.3.2.1 on AIX, before 6.3.2.2 on Windows, and before 6.3.2.3 on Linux; 6.4 before 6.4.2.1; and 7.1 before 7.1.1 in IBM TSM for Mail, when the Data Protection for Lotus Domino component is used, allow local users to bypass authentication and restore a Domino database or transaction-log backup via unspecified vectors.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncIBM CorporationOracle CorporationMicrosoft Corporation
Product-z\/ossolarislinux_kerneltivoli_storage_managerwindowslinux_on_ibm_zaixn/a
CWE ID-CWE-284
Improper Access Control
CVE-2020-4885
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-6.2||MEDIUM
EPSS-0.15% / 36.62%
||
7 Day CHG~0.00%
Published-24 Jun, 2021 | 18:45
Updated-17 Sep, 2024 | 02:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 could allow a local user to access and change the configuration of Db2 due to a race condition of a symbolic link,. IBM X-Force ID: 190909.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, Inc
Product-aixdb2linux_kernelDB2 for Linux and UNIX
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2012-0700
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-1.9||LOW
EPSS-0.05% / 14.63%
||
7 Day CHG~0.00%
Published-31 Jan, 2013 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The client in InfoSphere FastTrack 8.1 through 8.7 in IBM InfoSphere Information Server 8.1, 8.5 before FP3, and 8.7 does not properly store credentials, which allows local users to bypass intended access restrictions via unspecified vectors.

Action-Not Available
Vendor-n/aIBM Corporation
Product-infosphere_fasttrackinfosphere_information_servern/a
CVE-2015-7436
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-2.5||LOW
EPSS-0.03% / 8.39%
||
7 Day CHG~0.00%
Published-02 Jan, 2016 | 21:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Tivoli Common Reporting (TCR) 2.1 before IF14, 2.1.1 before IF22, 2.1.1.2 before IF9, 3.1.0.0 through 3.1.2 as used in Cognos Business Intelligence before 10.2 IF16, and 3.1.2.1 as used in Cognos Business Intelligence before 10.2.1.1 IF12 preserves user permissions across group-add and group-remove operations, which allows local users to bypass intended access restrictions in opportunistic circumstances by leveraging administrative changes to group membership.

Action-Not Available
Vendor-n/aIBM Corporation
Product-tivoli_common_reportingn/a
Details not found