The audit facility in the Security component in IBM DB2 UDB 9.5 before FP6a uses instance-level audit settings to capture connection (aka CONNECT and AUTHENTICATION) events in certain circumstances in which database-level audit settings were intended, which might make it easier for remote malicious users to connect without discovery.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ibm db2 universal database 9.5 |
||
ibm db2 universal database |