Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2010.0132 Vulnerabilities in DB2 31 May 2010 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM DB2 9.7 Operating System: AIX HP-UX Linux variants Solaris Windows Impact/Access: Denial of Service -- Remote/Unauthenticated Unauthorised Access -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2010-0472 CVE-2009-3555 Member content until: Wednesday, June 30 2010 OVERVIEW A number of vulnerabilities have been identified in IBM DB2 9.7 and corrected in Fix Pack 2. IMPACT The vendor has provided the following details regarding these vulnerabilities: "A set of security vulnerabilities was discovered in some DB2 database products. These vulnerabilities were analyzed by the DB2 development organization and a set of corresponding fixes was created to address the reported issues. IBM is not currently aware of any externally reported incidents where production DB2 installations have been compromised due to these issues. The affected DB2 UDB for Linux, UNIX, and Windows products are: * DB2 Enterprise Server Edition * DB2 Workgroup Server (all Editions) * DB2 Express Server (all Editions) * DB2 Personal Edition * DB2 Connect Server (all Editions) DB2 Client component and DB2 products or components other than those listed above are not affected." [1] The related APARs for v9.7 FP2: [1] - IC68762 SECURITY: THE TIVOLI MONITORING AGENT (KUDDB2) FOR DB2 HAS DOS VULNERABILITY. (CVE-2010-0472) - IC68055 SECURITY: TRANSPORT LAYER SECURITY (TLS) HANDSHAKE RENEGOTIATION WEAK SECURITY CVE-2009-3555 - IC67008 SECURITY: SYSTEM GRANTED PRIVILEGES NOT REGENERATED ON VIEWS WHEN AUTO_REVAL IS SET TO IMMEDIATE - IC67819 SECURITY: MONITOR ADMINISTRATIVE VIEWS IN SYSIBMADM SCHEMA ARE VIEWABLE BY PUBLIC. MITIGATION The vendor has released an update to correct these vulnerabilities. [2] REFERENCES [1] Security Vulnerabilities and HIPER APARs fixed in DB2 for Linux, UNIX, and Windows Version 9.7 Fix Pack 2 http://www-01.ibm.com/support/docview.wss?uid=swg21432298&myns=swgimgmt&mynp=OCSSEPGG&mync=E [2] DB2 Fix Packs by version for DB2 for Linux, UNIX and Windows http://www-01.ibm.com/support/docview.wss?rs=71&uid=swg27007053 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFMAybw/iFOrG6YcBERAm3AAJ9/e4vD7RsSA6uOxsWJ9CRrEPjaTQCfdzRA sjMQCMFjkzgB77W0wvKTe8s= =uc6k -----END PGP SIGNATURE-----