
====================================================================

                             CERT-Renater

                 Note d'Information No. 2020/VULN666
_____________________________________________________________________

DATE                : 08/12/2020

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running IBM® Db2 versions 9.7, 10.1, 10.5,
                                         11.1, 11.5.

=====================================================================
https://www.ibm.com/support/pages/node/6242332
https://www.ibm.com/support/pages/node/6242362
_____________________________________________________________________


Security Bulletin: IBM® Db2® is vulnerable to buffer overflow leading to
a privileged escalation (CVE-2020-4363)

Security Bulletin


Summary

IBM® Db2® is vulnerable to a buffer overflow, caused by improper bounds
checking which could allow a local attacker to execute arbitrary code on
the system with root privileges.


Vulnerability Details

CVEID:         CVE-2020-4363
DESCRIPTION:   IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect
               Server) is vulnerable to a buffer overflow, caused by
               improper bounds checking which could allow a local
               attacker to execute arbitrary code on the system with
               root privileges.
CVSS Base score:     8.4
CVSS Temporal Score: See:
https://exchange.xforce.ibmcloud.com/vulnerabilities/178960 for the
current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)


Affected Products and Versions

All fix pack levels of IBM Db2 V9.7, V10.1, V10.5, V11.1, and V11.5
editions on all platforms are affected.


Remediation/Fixes

Customers running any vulnerable fixpack level of an affected Program
can download the special build containing the interim fix for this issue
from Fix Central. These special builds are available based on the most
recent fixpack level for each impacted release: V9.7 FP11, V10.1 FP6,
V10.5 FP11, 11.1 FP5, and V11.5 GA. They can be applied to any affected
fixpack level of the appropriate release to remediate this
vulnerability.


Release	Fixed in fix pack	APAR	Download URL

V9.7	TBD	IT32360	Special Build for V9.7 FP11:

AIX 64-bit
HP-UX 64-bit
Linux 32-bit, x86-32
Linux 64-bit, x86-64
Linux 64-bit, POWER™ big endian
Linux 64-bit, System z®, System z9® or zSeries®
Solaris 64-bit, SPARC
Solaris 64-bit, x86-64
Windows 32-bit, x86
Windows 64-bit, x86


V10.1	TBD	IT32359	Special Build for V10.1 FP6:

AIX 64-bit
HP-UX 64-bit
Linux 32-bit, x86-32
Linux 64-bit, x86-64
Linux 64-bit, POWER™ big endian
Linux 64-bit, System z®, System z9® or zSeries®
Solaris 64-bit, SPARC
Solaris 64-bit, x86-64
Windows 32-bit, x86
Windows 64-bit, x86


V10.5	TBD	IT32358	Special Build for V10.5 FP11:

AIX 64-bit
HP-UX 64-bit
Linux 32-bit, x86-32
Linux 64-bit, x86-64
Linux 64-bit, POWER™ big endian
Linux 64-bit, POWER™ little endian
Linux 64-bit, System z®, System z9® or zSeries®
Solaris 64-bit, SPARC
Solaris 64-bit, x86-64
Windows 32-bit, x86
Windows 64-bit, x86
Inspur


V11.1	TBD	IT32356	Special Build for V11.1 FP5:

AIX 64-bit
Linux 32-bit, x86-32
Linux 64-bit, x86-64
Linux 64-bit, POWER™ little endian
Linux 64-bit, System z®, System z9® or zSeries®
Solaris 64-bit, SPARC
Windows 32-bit, x86
Windows 64-bit, x86


V11.5	TBD	IT32357	Build for V11.5.4 GA:

https://www.ibm.com/support/pages/node/6241724



Workarounds and Mitigations

None


Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product
support alerts like this.


References

Complete CVSS v3 Guide
On-line Calculator v3


Related Information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog


Acknowledgement

The vulnerability was reported to IBM by Eddie Zhu, BEIJING DBSEC
TECHNOLOGY CO., LTD.


Change History

7 December 2020: Updated Windows 64-bit image for 9.7
26 November 2020: Windows images for 9.7 updated
9 October 2020: Linux/Unix images for 9.7 refreshed
18 August 2020: Windows images for 9.7 refreshed
30 June 2020: Initial Publication

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the
impact of this vulnerability in their environments by accessing the
links in the Reference section of this Security Bulletin.


Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open
standard designed to convey vulnerability severity and help to determine
urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS
IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE
RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY
VULNERABILITY.

_____________________________________________________________________


Security Bulletin: IBM® Db2® is vulnerable to a denial of service attack
(CVE-2020-4420)

Security Bulletin


Summary

IBM® Db2® could allow an unauthenticated attacker to cause a denial of
service due to a hang in the execution of a terminate command.


Vulnerability Details

CVEID:         CVE-2020-4420
DESCRIPTION:   IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect
               Server) could allow an unauthenticated attacker to cause
               a denial of service due a hang in the execution of a
               terminate command.
CVSS Base score:     7.5
CVSS Temporal Score: See:
https://exchange.xforce.ibmcloud.com/vulnerabilities/180076 for the
current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)


Affected Products and Versions

All fix pack levels of IBM Db2 V9.7, V10.1, V10.5, V11.1, and V11.5
editions on all platforms are affected.


Remediation/Fixes

Customers running any vulnerable fixpack level of an affected Program
can download the special build containing the interim fix for this issue
from Fix Central. These special builds are available based on the most
recent fixpack level for each impacted release: V9.7 FP11, V10.1 FP6,
V10.5 FP11, 11.1 FP5, and V11.5 GA. They can be applied to any affected
fixpack level of the appropriate release to remediate this
vulnerability.


Release	Fixed in fix pack	APAR	Download URL

V9.7	TBD	IT32822	Special Build for V9.7 FP11:

AIX 64-bit
HP-UX 64-bit
Linux 32-bit, x86-32
Linux 64-bit, x86-64
Linux 64-bit, POWER™ big endian
Linux 64-bit, System z®, System z9® or zSeries®
Solaris 64-bit, SPARC
Solaris 64-bit, x86-64
Windows 32-bit, x86
Windows 64-bit, x86


V10.1	TBD	IT32821	Special Build for V10.1 FP6:

AIX 64-bit
HP-UX 64-bit
Linux 32-bit, x86-32
Linux 64-bit, x86-64
Linux 64-bit, POWER™ big endian
Linux 64-bit, System z®, System z9® or zSeries®
Solaris 64-bit, SPARC
Solaris 64-bit, x86-64
Windows 32-bit, x86
Windows 64-bit, x86


V10.5	TBD	IT32362	Special Build for V10.5 FP11:

AIX 64-bit
HP-UX 64-bit
Linux 32-bit, x86-32
Linux 64-bit, x86-64
Linux 64-bit, POWER™ big endian
Linux 64-bit, POWER™ little endian
Linux 64-bit, System z®, System z9® or zSeries®
Solaris 64-bit, SPARC
Solaris 64-bit, x86-64
Windows 32-bit, x86
Windows 64-bit, x86
Inspur


V11.1	TBD	IT32287	Special Build for V11.1 FP5:

AIX 64-bit
Linux 32-bit, x86-32
Linux 64-bit, x86-64
Linux 64-bit, POWER™ little endian
Linux 64-bit, System z®, System z9® or zSeries®
Solaris 64-bit, SPARC
Windows 32-bit, x86
Windows 64-bit, x86


V11.5	TBD	IT32363	Build for V11.5.4 GA:

https://www.ibm.com/support/pages/node/6241724



Workarounds and Mitigations

None


Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product
support alerts like this.


References

Complete CVSS v3 Guide
On-line Calculator v3


Related Information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog


Acknowledgement

Change History

7 December 2020: Windows 64-bit image for 9.7 updated
26 November 2020: Windows images for 9.7 updated
9 October 2020: Linux/Unix images for 9.7 refreshed
18 August 2020: Windows images for 9.7 refreshed
30 June 2020: Initial Publication

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the
impact of this vulnerability in their environments by accessing the
links in the Reference section of this Security Bulletin.


Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open
standard designed to convey vulnerability severity and help to determine
urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS
IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE
RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY
VULNERABILITY.


=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================


