IBM Support

Security Bulletin: Vulnerability in Install of Informix Dynamic Server on Windows (CVE-2016-0226)

Security Bulletin


IBM Informix Dynamic Server, Windows Client, is vulnerable to a privilege escalation attack.

Vulnerability Details

CVEID: CVEID: CVE-2016-0226

DESCRIPTION: Windows client installations of IBM Informix Dynamic Server could allow a local user to gain privileges.

CVSS Base Score: 8.4
CVSS Temporal Score: See for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

IBM Informix Dynamic Server v 11.70.xCn (Windows)


Affected Version

IBM Informix Dynamic Server v 11.70.xCn (Windows)Fix Central

Workarounds and Mitigations

Refer to README. Fix Central

Get Notified about Future Security Bulletins




The vulnerability was reported to IBM by Steven Seeley of Source Incite working with HP's Zero Day Initiative

Change History

21 March 2016: Original version published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.


According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{"Product":{"code":"SSGU8G","label":"Informix Servers"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"--","Platform":[{"code":"PF033","label":"Windows"}],"Version":"11.7","Edition":"","Line of Business":{"code":"","label":""}}]

Document Information

Modified date:
29 September 2018