-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2021.3129.3
IBM(R) Db2(R) could allow a local user to read and write specific files due
                 to weak file permissions (CVE-2020-4976)
                              9 December 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM DB2
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Overwrite Arbitrary Files -- Existing Account
                   Access Confidential Data  -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-4976  

Reference:         ESB-2021.0889

Original Bulletin: 
   https://www.ibm.com/support/pages/node/6489495

Revision History:  December   9 2021: Updated vulnerable product versions
                   September 17 2021: Vendor added link for v10.5 Windows 32-bit x86
                   September 16 2021: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

IBM Db could allow a local user to read and write specific files due to
weak file permissions (CVE-2020-4976)

Document Information

Document number    : 6489495
Modified date      : 08 December 2021
Product            : DB2 for Linux- UNIX and Windows
Software version   : 9.7,10.1,10.5,11.1,11.5
Operating system(s): AIX
                     HP-UX
                     Linux
                     Solaris
                     Windows

Summary

IBM Db2 could allow a local user to read and write specific files due to weak
file permissions

Vulnerability Details

CVEID: CVE-2020-4976
DESCRIPTION: IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server)
9.7, 10.1, 10.5, 11.1, and 11.5 could allow a local user to read and write
specific files due to weak file permissions. IBM X-Force ID: 192469.
CVSS Base score: 5.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
192469 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

Affected Products and Versions

All fix pack levels of IBM Db2 V9.7, V10.1, V10.5, V11.1, and V11.5 editions on
all platforms are affected.

Remediation/Fixes

Customers running any vulnerable fixpack level of an affected Program, V9.7,
V10.1, V10.5, v11.1 and V11.5, can download the special build containing the
interim fix for this issue from Fix Central. These special builds are available
based on the most recent fixpack level for each impacted release: V9.7 FP11,
V10.1 FP6, V10.5 FP11, V11.1.4 FP6, and V11.5.6. They can be applied to any
affected fixpack level of the appropriate release to remediate this
vulnerability.

+-------+--------------+-------+----------------------------------------------+
|Release|Fixed in fix  |APAR   |Download URL                                  |
|       |pack          |       |                                              |
+-------+--------------+-------+----------------------------------------------+
|V9.7   |TBD           |IT36910|Special Build for V9.7 FP11:                  |
|       |              |       |                                              |
|       |              |       |AIX 64-bit                                    |
|       |              |       |HP-UX 64-bit                                  |
|       |              |       |Linux 32-bit, x86-32                          |
|       |              |       |Linux 64-bit, x86-64                          |
|       |              |       |Linux 64-bit, POWER big endian                |
|       |              |       |Linux 64-bit, System z, System z9 or zSeries  |
|       |              |       |Solaris 64-bit, SPARC                         |
|       |              |       |Solaris 64-bit, x86-64                        |
|       |              |       |Windows 32-bit, x86 (link will be updated when|
|       |              |       |available)                                    |
|       |              |       |Windows 64-bit, x86 (link will be updated when|
|       |              |       |available)                                    |
+-------+--------------+-------+----------------------------------------------+
|V10.1  |TBD           |IT36909|Special Build for V10.1 FP6:                  |
|       |              |       |                                              |
|       |              |       |AIX 64-bit                                    |
|       |              |       |HP-UX 64-bit                                  |
|       |              |       |Linux 32-bit, x86-32                          |
|       |              |       |Linux 64-bit, x86-64                          |
|       |              |       |Linux 64-bit, POWER big endian                |
|       |              |       |Linux 64-bit, System z, System z9 or zSeries  |
|       |              |       |Solaris 64-bit, SPARC                         |
|       |              |       |Solaris 64-bit, x86-64                        |
|       |              |       |Windows 32-bit, x86                           |
|       |              |       |Windows 64-bit, x86                           |
+-------+--------------+-------+----------------------------------------------+
|V10.5  |TBD           |IT36908|Special Build for V10.5 FP11:                 |
|       |              |       |                                              |
|       |              |       |AIX 64-bit                                    |
|       |              |       |HP-UX 64-bit                                  |
|       |              |       |Linux 32-bit, x86-32                          |
|       |              |       |Linux 64-bit, x86-64                          |
|       |              |       |Linux 64-bit, POWER big endian                |
|       |              |       |Linux 64-bit, POWER little endian             |
|       |              |       |Linux 64-bit, System z, System z9 or zSeries  |
|       |              |       |Solaris 64-bit, SPARC                         |
|       |              |       |Solaris 64-bit, x86-64                        |
|       |              |       |Windows 32-bit, x86                           |
|       |              |       |Windows 64-bit, x86                           |
|       |              |       |Inspur                                        |
+-------+--------------+-------+----------------------------------------------+
|V11.1  |TBD           |IT36869|Special Build for V11.1.4 FP6:                |
|       |              |       |                                              |
|       |              |       |AIX 64-bit                                    |
|       |              |       |Linux 32-bit, x86-32                          |
|       |              |       |Linux 64-bit, x86-64                          |
|       |              |       |Linux 64-bit, POWER little endian             |
|       |              |       |Linux 64-bit, System z, System z9 or zSeries  |
|       |              |       |Solaris 64-bit, SPARC                         |
|       |              |       |Windows 32-bit, x86                           |
|       |              |       |Windows 64-bit, x86                           |
+-------+--------------+-------+----------------------------------------------+
|V11.5  |11.5.7        |IT36907|https://www.ibm.com/support/pages/node/6524304|
+-------+--------------+-------+----------------------------------------------+

Workarounds and Mitigations

None

Acknowledgement

Change History

08 Dec 2021: Updated 11.5 link to the 11.5.7 release
19 Oct 2021: Refreshed image for 11.5 Windows 64-bit (corrected spec file)
29 Sep 2021: Refreshed image for 11.5 Windows 64-bit
20 Sep 2021: Added links for v10.1 Windows builds
16 Sep 2021: Added link for v10.5 Windows 32-bit x86
15 Sep 2021: Initial Publication

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=UhNS
-----END PGP SIGNATURE-----