Vulnerability Name:
CVE-2020-4945 (CCN-191945)
Assigned:
2019-12-30
Published:
2021-06-23
Updated:
2021-09-20
Summary:
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 could allow an authenticated user to overwrite arbirary files due to improper group permissions. IBM X-Force ID: 191945.
CVSS v3 Severity:
8.1 High
(CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
)
7.1 High
(Temporal CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
High
Availibility (A):
High
6.5 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
)
5.7 Medium
(CCN Temporal CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
High
Availibility (A):
None
CVSS v2 Severity:
5.5 Medium
(CVSS v2 Vector:
AV:N/AC:L/Au:S/C:N/I:P/A:P
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Authentication (Au):
Single_Instance
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Partial
Availibility (A):
Partial
6.8 Medium
(CCN CVSS v2 Vector:
AV:N/AC:L/Au:S/C:N/I:C/A:N
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Athentication (Au):
Single_Instance
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Complete
Availibility (A):
None
Vulnerability Type:
CWE-732
Vulnerability Consequences:
Data Manipulation
References:
Source: MITRE
Type: CNA
CVE-2020-4945
Source: XF
Type: UNKNOWN
ibm-db2-cve20204945-file-overwrite(191945)
Source: XF
Type: VDB Entry, Vendor Advisory
ibm-db2-cve20204945-file-overwrite (191945)
Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20210720-0006/
Source: CCN
Type: IBM Security Bulletin 6466367 (DB2 for Linux and UNIX)
IBM Db2 could allow an authenticated user to overwrite arbirary files due to improper group permissions. (CVE-2020-4945)
Source: CONFIRM
Type: Patch, Vendor Advisory
https://www.ibm.com/support/pages/node/6466367
Source: CCN
Type: IBM Security Bulletin 6490789 (Emptoris Sourcing)
Multiple IBM Db2 Server Vulnerabilities Affect IBM Emptoris Sourcing
Source: CCN
Type: IBM Security Bulletin 6490791 (Emptoris Supplier Lifecycle Management)
Multiple IBM Db2 Server Vulnerabilities Affect IBM Emptoris Supplier Lifecycle Mgmt
Source: CCN
Type: IBM Security Bulletin 6490795 (Emptoris Strategic Supply Management)
Multiple IBM DB2 Server Vulnerabilities Affect IBM Emptoris Strategic Supply Management Platform
Source: CCN
Type: IBM Security Bulletin 6490797 (Emptoris Program Management)
Multiple IBM Db2 Server Vulnerabilities Affect IBM Emptoris Program Management
Source: CCN
Type: IBM Security Bulletin 6490801 (Emptoris Contract Management)
Multiple IBM Db2 Server Vulnerabilities Affect IBM Emptoris Contract Management
Source: CCN
Type: IBM Security Bulletin 6524726 (Spectrum Protect Server)
Vulnerabilities in IBM Db2 affect IBM Spectrum Protect Server (CVE-2021-29777, CVE-2021-20579, CVE-2021-29703, CVE-2020-4885, CVE-2020-4945)
Source: CCN
Type: IBM Security Bulletin 6528194 (Monitoring)
Multiple vulnerabilities have been identified in DB2 that affect the IBM Performance Management product.
Source: CCN
Type: IBM Security Bulletin 6583541 (Cloud Pak System Software)
Multiple vulnerabilities found in Db2 affect IBM Cloud Pak System Software and Cloud Pak System Software Suite
Vulnerable Configuration:
Configuration 1
:
cpe:/a:ibm:db2:11.5:*:*:*:*:-:*:*
AND
cpe:/o:ibm:aix:-:*:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:-:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/a:ibm:db2:11.5:*:*:*:*:linux:*:*
OR
cpe:/a:ibm:db2:11.5:*:*:*:*:unix:*:*
AND
cpe:/a:ibm:emptoris_sourcing:10.1.0:*:*:*:*:*:*:*
OR
cpe:/a:ibm:emptoris_sourcing:10.1.1:*:*:*:*:*:*:*
OR
cpe:/a:ibm:emptoris_contract_management:10.1.0:*:*:*:*:*:*:*
OR
cpe:/a:ibm:emptoris_sourcing:10.1.3:*:*:*:*:*:*:*
OR
cpe:/a:ibm:monitoring:8.1.4:*:*:*:*:*:*:*
OR
cpe:/a:ibm:emptoris_contract_management:10.1.1:*:*:*:*:*:*:*
OR
cpe:/a:ibm:emptoris_contract_management:10.1.3:*:*:*:*:*:*:*
OR
cpe:/a:ibm:emptoris_program_management:10.1.0:*:*:*:*:*:*:*
OR
cpe:/a:ibm:emptoris_program_management:10.1.1:*:*:*:*:*:*:*
OR
cpe:/a:ibm:emptoris_program_management:10.1.3:*:*:*:*:*:*:*
OR
cpe:/a:ibm:emptoris_supplier_lifecycle_management:10.1.0:*:*:*:*:*:*:*
OR
cpe:/a:ibm:emptoris_supplier_lifecycle_management:10.1.1:*:*:*:*:*:*:*
OR
cpe:/a:ibm:emptoris_supplier_lifecycle_management:10.1.3:*:*:*:*:*:*:*
OR
cpe:/a:ibm:emptoris_strategic_supply_management:10.1.0:*:*:*:*:*:*:*
OR
cpe:/a:ibm:emptoris_strategic_supply_management:10.1.1:*:*:*:*:*:*:*
OR
cpe:/a:ibm:emptoris_strategic_supply_management:10.1.3:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
ibm
db2 11.5
ibm
aix -
linux
linux kernel -
ibm
db2 11.5
ibm
db2 11.5
ibm
emptoris sourcing 10.1.0
ibm
emptoris sourcing 10.1.1
ibm
emptoris contract management 10.1.0
ibm
emptoris sourcing 10.1.3
ibm
monitoring 8.1.4
ibm
emptoris contract management 10.1.1
ibm
emptoris contract management 10.1.3
ibm
emptoris program management 10.1.0
ibm
emptoris program management 10.1.1
ibm
emptoris program management 10.1.3
ibm
emptoris supplier lifecycle management 10.1.0
ibm
emptoris supplier lifecycle management 10.1.1
ibm
emptoris supplier lifecycle management 10.1.3
ibm
emptoris strategic supply management 10.1.0
ibm
emptoris strategic supply management 10.1.1
ibm
emptoris strategic supply management 10.1.3