The host is installed with IBM DB2 UDB 9.5 before FP6a and is prone to security vulnerability. A flaw is present in security component in IBM DB2 which logs AUDIT events by using a USERID and an AUTHID value corresponding to the instance owner, instead of a USERID and an AUTHID value corresponding to the logged-in user account. Successful exploitation allow remote authenticated users to execute Au ...