
====================================================================

                             CERT-Renater

                 Note d'Information No. 2020/VULN639
_____________________________________________________________________

DATE                : 24/11/2020

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running IBM DB2.

=====================================================================
https://www.ibm.com/support/pages/node/6370023
_____________________________________________________________________

Security Bulletin: IBM® Db2® could allow a local authenticated attacker
to execute arbitrary code on the system, caused by DLL search order
hijacking vulnerability in Microsoft Windows client. (CVE-2020-4739)


Security Bulletin

Summary

IBM DB2 on Windows could allow a local authenticated attacker to execute
arbitrary code on the system, caused by DLL search order hijacking
vulnerability in Microsoft Windows client. By placing a specially
crafted file in a compromised folder, an attacker could exploit this
vulnerability to execute arbitrary code on the system.


Vulnerability Details

CVEID:          CVE-2020-4739
DESCRIPTION:   IBM DB2 Accessories Suite for Linux, UNIX, and Windows,
               DB2 for Linux, UNIX and Windows (includes DB2 Connect
               Server) could allow a local authenticated attacker to
               execute arbitrary code on the system, caused by DLL
               search order hijacking vulnerability in Microsoft Windows
               client. By placing a specially crafted file in a
               compromised folder, an attacker could exploit this
               vulnerability to execute arbitrary code on the system.

CVSS Base score: 7.8
CVSS Temporal Score: See:
https://exchange.xforce.ibmcloud.com/vulnerabilities/188149 for the
current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)


Affected Products and Versions

All fix pack levels of IBM Db2 V9.7, V10.1, V10.5, V11.1, and V11.5
editions on Windows are affected.  Linux and Unix are not affected.


Remediation/Fixes

Customers running any vulnerable fixpack level of an affected Program
can download the special build containing the interim fix for this issue
from Fix Central. These special builds are available based on the most
recent fixpack level for each impacted release: V9.7 FP11, V10.1 FP6,
V10.5 FP11, 11.1 FP5, and V11.5.4. They can be applied to any affected
fixpack level of the appropriate release to remediate this
vulnerability.


Release	Fixed in fix pack	APAR	Download URL

V9.7	TBD	IT34241	   Special Build for V9.7 FP11:
                            Windows 32-bit, x86
                            Windows 64-bit, x86
                           (URLs will be updated when they become
                            available)

V10.1	TBD	IT34240	   Special Build for V10.1 FP6:
                            Windows 32-bit, x86
                            Windows 64-bit, x86

V10.5	TBD	IT34239	   Special Build for V10.5 FP11:
                            Windows 32-bit, x86
                            Windows 64-bit, x86

V11.1	TBD	IT34238	   Special Build for V11.1 FP5:
                            Windows 32-bit, x86
                            Windows 64-bit, x86

V11.5	11.5.5.0  IT34221   Build for V11.5.5 GA:
                          https://www.ibm.com/support/pages/node/6368787



Workarounds and Mitigations

None


Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product
support alerts like this.


References

Complete CVSS v3 Guide
On-line Calculator v3


Related Information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog


Acknowledgement

This vulnerability was reported to IBM by Hou JingYi (@hjy79425575) of
Qihoo 360 CERT


Change History

19 Nov 2020: URLs added for DB2 10.1
18 Nov 2020: Initial Publication

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the
impact of this vulnerability in their environments by accessing the
links in the Reference section of this Security Bulletin.


Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open
standard designed to convey vulnerability severity and help to determine
urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS
IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE
RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY
VULNERABILITY.


=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================


