Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.3129.3 IBM(R) Db2(R) could allow a local user to read and write specific files due to weak file permissions (CVE-2020-4976) 9 December 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM DB2 Publisher: IBM Operating System: AIX HP-UX Linux variants Solaris Windows Impact/Access: Overwrite Arbitrary Files -- Existing Account Access Confidential Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2020-4976 Reference: ESB-2021.0889 Original Bulletin: https://www.ibm.com/support/pages/node/6489495 Revision History: December 9 2021: Updated vulnerable product versions September 17 2021: Vendor added link for v10.5 Windows 32-bit x86 September 16 2021: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- IBM Db could allow a local user to read and write specific files due to weak file permissions (CVE-2020-4976) Document Information Document number : 6489495 Modified date : 08 December 2021 Product : DB2 for Linux- UNIX and Windows Software version : 9.7,10.1,10.5,11.1,11.5 Operating system(s): AIX HP-UX Linux Solaris Windows Summary IBM Db2 could allow a local user to read and write specific files due to weak file permissions Vulnerability Details CVEID: CVE-2020-4976 DESCRIPTION: IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow a local user to read and write specific files due to weak file permissions. IBM X-Force ID: 192469. CVSS Base score: 5.1 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 192469 for the current score. CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) Affected Products and Versions All fix pack levels of IBM Db2 V9.7, V10.1, V10.5, V11.1, and V11.5 editions on all platforms are affected. Remediation/Fixes Customers running any vulnerable fixpack level of an affected Program, V9.7, V10.1, V10.5, v11.1 and V11.5, can download the special build containing the interim fix for this issue from Fix Central. These special builds are available based on the most recent fixpack level for each impacted release: V9.7 FP11, V10.1 FP6, V10.5 FP11, V11.1.4 FP6, and V11.5.6. They can be applied to any affected fixpack level of the appropriate release to remediate this vulnerability. +-------+--------------+-------+----------------------------------------------+ |Release|Fixed in fix |APAR |Download URL | | |pack | | | +-------+--------------+-------+----------------------------------------------+ |V9.7 |TBD |IT36910|Special Build for V9.7 FP11: | | | | | | | | | |AIX 64-bit | | | | |HP-UX 64-bit | | | | |Linux 32-bit, x86-32 | | | | |Linux 64-bit, x86-64 | | | | |Linux 64-bit, POWER big endian | | | | |Linux 64-bit, System z, System z9 or zSeries | | | | |Solaris 64-bit, SPARC | | | | |Solaris 64-bit, x86-64 | | | | |Windows 32-bit, x86 (link will be updated when| | | | |available) | | | | |Windows 64-bit, x86 (link will be updated when| | | | |available) | +-------+--------------+-------+----------------------------------------------+ |V10.1 |TBD |IT36909|Special Build for V10.1 FP6: | | | | | | | | | |AIX 64-bit | | | | |HP-UX 64-bit | | | | |Linux 32-bit, x86-32 | | | | |Linux 64-bit, x86-64 | | | | |Linux 64-bit, POWER big endian | | | | |Linux 64-bit, System z, System z9 or zSeries | | | | |Solaris 64-bit, SPARC | | | | |Solaris 64-bit, x86-64 | | | | |Windows 32-bit, x86 | | | | |Windows 64-bit, x86 | +-------+--------------+-------+----------------------------------------------+ |V10.5 |TBD |IT36908|Special Build for V10.5 FP11: | | | | | | | | | |AIX 64-bit | | | | |HP-UX 64-bit | | | | |Linux 32-bit, x86-32 | | | | |Linux 64-bit, x86-64 | | | | |Linux 64-bit, POWER big endian | | | | |Linux 64-bit, POWER little endian | | | | |Linux 64-bit, System z, System z9 or zSeries | | | | |Solaris 64-bit, SPARC | | | | |Solaris 64-bit, x86-64 | | | | |Windows 32-bit, x86 | | | | |Windows 64-bit, x86 | | | | |Inspur | +-------+--------------+-------+----------------------------------------------+ |V11.1 |TBD |IT36869|Special Build for V11.1.4 FP6: | | | | | | | | | |AIX 64-bit | | | | |Linux 32-bit, x86-32 | | | | |Linux 64-bit, x86-64 | | | | |Linux 64-bit, POWER little endian | | | | |Linux 64-bit, System z, System z9 or zSeries | | | | |Solaris 64-bit, SPARC | | | | |Windows 32-bit, x86 | | | | |Windows 64-bit, x86 | +-------+--------------+-------+----------------------------------------------+ |V11.5 |11.5.7 |IT36907|https://www.ibm.com/support/pages/node/6524304| +-------+--------------+-------+----------------------------------------------+ Workarounds and Mitigations None Acknowledgement Change History 08 Dec 2021: Updated 11.5 link to the 11.5.7 release 19 Oct 2021: Refreshed image for 11.5 Windows 64-bit (corrected spec file) 29 Sep 2021: Refreshed image for 11.5 Windows 64-bit 20 Sep 2021: Added links for v10.1 Windows builds 16 Sep 2021: Added link for v10.5 Windows 32-bit x86 15 Sep 2021: Initial Publication - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYbFe1uNLKJtyKPYoAQjYgBAAsvbXFJUrZcZh9FYZu+gluUdyUxriiDZy YCHrGHYoCfMAlKP5t9cGkpxTadkC6R3AGiDhIBadq2Pptub5t4eb3HG9JFNLLh2m DpLJEQ/fhJPHNbFhjCl6Av/DxwxfO9XtmkvlHGrTsdQCtjCx6lsuWPgbUTsKr5Xw CIGac0Rf3E7Tw1C3gu+OPrvasuRXW6K4p5bxqrzYS3ypz89xaayPypyaj+S1ukPC Fzq4TN+pc7cshzCmM/qjHp2diXMWThLwDyqsgVANtAGIE5AcKnZEHEc9YE4irLCt AuRxExnDV3+sIiGSdy3NflpdZfDEDliZK3brT/6bNbdpepMOnIC6QHMXgFxNnK38 aAPie0Yu/uVZFgWZqSIzTz0Qe+TsrE6320+6zc3w+2juhqSEQQim39WE84zFbxU1 NuuL5/IhTGLzJ68LqnOKFwZPnQcWtfgNseQ0Xb3XKzD02h4G6vC39gTouUGmKC6d Lccgyv6SY1ovk7ltwENczeD2CaGugQgIEIG38H4CK6Ru/zNkc3YAuwRcD0nYOyuM rHQpT3r7r2iBYab2gQJptpXu0g2tFP+67NDzbUDDorm5Sk/XGv+3S9TIHCUOcMGY KixFoyNC2MGEPpD41qYxiqt0ry/U+aeS6rMLyKp8iB41pez3wRO/bQgEswbvHbhW kL9v7ceBIMI= =UhNS -----END PGP SIGNATURE-----