Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2014.0093 Executing a query with an OLAP specification on the IBM InfoSphere Balanced Warehouse C3000, C4000, D5100, IBM Smart Analytics System 1050, 2050, 5600, 5710, 7600 causes the DB2 server to terminate database connections 23 January 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM Smart Analytics System Publisher: IBM Operating System: AIX Linux variants Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2013-6717 Reference: ESB-2013.1816 Original Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21659490 - --------------------------BEGIN INCLUDED TEXT-------------------- Security Bulletin: Executing a query with an OLAP specification on the IBM InfoSphere Balanced Warehouse C3000, C4000, D5100, IBM Smart Analytics System 1050, 2050, 5600, 5710, 7600 causes the DB2 server to terminate database connections (CVE-2013-6717) Security Bulletin Document information More support for: IBM Smart Analytics System Software version: 9.7, 10.1 Operating system(s): AIX 6.1, Linux Reference #: 1659490 Modified date: 2014-01-21 Summary A vulnerability in IBM DB2 could allow a remote, authenticated user to cause a DB2 LUW server to terminate all connections to a database and deactivate the database. This only affects the database which the user is connected to. Vulnerability Details CVE ID: CVE-2013-6717 DESCRIPTION: The IBM InfoSphere Balanced Warehouse C3000, C4000 and D5100, IBM Smart Analytics System 1050, 2050, 5600, 5710, and 7600 ships with either DB2 9.7 or DB2 10.1. There is a security vulnerability which could allow a remote, authenticated user to exploit a vulnerability in the DB2 OLAP query engine to cause the DB2 server instance to terminate all connections to a database and deactivate the database. This only affects the database that the user is connected to. The vulnerability does not shut down the DB2 server instance. CVSS: CVSS Base Score: 3.5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/89116 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:S/C:N/I:N/A:P) Affected Products IBM InfoSphere Balanced Warehouse C3000 IBM InfoSphere Balanced Warehouse C4000 IBM InfoSphere Balanced Warehouse D5100 IBM Smart Analytics System 1050 IBM Smart Analytics System 2050 IBM Smart Analytics System 5600 IBM Smart Analytics System 5710 IBM Smart Analytics System 7600 Remediation/Fixes Find your product in the table below and use the link in the Download URL column to find the patch provided by IBM. For more information about IBM registration IDs, see the IBM Registration FAQ page. Product Version APAR Download URL IBM InfoSphere Balanced Warehouse C3000 DB2 9.7 IC95641 DB2 9.7 FP9 IBM InfoSphere Balanced Warehouse C4000 IBM InfoSphere Balanced Warehouse D5100 IBM Smart Analytics System 1050 IBM Smart Analytics System 2050 IBM Smart Analytics System 5600 V1 IBM Smart Analytics System 5600 V2 IBM Smart Analytics System 5600 V3 DB2 9.7 IC95641 Contact technical support. IBM Smart Analytics System 5600 V3 DB2 10.1 IC97737 Contact technical support. IBM Smart Analytics System 5710 DB2 9.7 IC95641 DB2 9.7 FP9 IBM Smart Analytics System 7600 Contact Technical Support: In the United States and Canada dial 1-800-IBM-SERV View the support contacts for other countries outside of the United States. Electronically open a Service Request with DB2 technical support. Workarounds/Mitigations None References: Complete CVSS Guide On-line Calculator V2 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Change History January 21, 2014: Original version published. *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. Cross reference information Segment Product Component Platform Version Edition Information Management InfoSphere Balanced Warehouse Balanced Warehouse C Class - C4000 Linux, Windows 9.7 Information Management InfoSphere Balanced Warehouse Balanced Warehouse D Class - D5100 Linux 9.7 Information Management IBM Smart Analytics System IBM Smart Analytics System 1050 Linux, Windows 9.7 Information Management IBM Smart Analytics System IBM Smart Analytics System 2050 Linux, Windows 9.7 Information Management IBM Smart Analytics System IBM Smart Analytics System 5600 Linux 9.7, 10.1 Information Management IBM Smart Analytics System IBM Smart Analytics System 5710 Linux 9.7 Information Management IBM Smart Analytics System IBM Smart Analytics System 7600 AIX 6.1 9.7 Information Management InfoSphere Balanced Warehouse Balanced Warehouse C Class - C3000 Linux, Windows 9.7 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUuCb8RLndAQH1ShLAQJGyg/+O999yEeabWKxWXTWIWrVaErsBA5Wea8z jQ2FI3V8+i/98XCFr6S11obHDZ8k/XfNN5VDqUXlu9Su7EPiLURtAcUzF6xn8sf+ TKXDxmKqA06978KpRZ5fl3CwqNye/xOyGIbMGDfkr/p3c9Nj1RZapLlcm/JOppdG JXsROEJuLusY2aIf+fGNsnRrEU1c/d7hXcClmjaZAc0ZS0TGFrmotyvZtiCsCUVO 4ykmVQ1/LpzslKz0TvYwUIAaQE96oDYuOZkFqJJxZbRRyUWMgvSBoihbrRLbg8OH MxIibeZAtzZ/8VIfVc720XVMLpO9dg8+tibxWfMrUZrCJFfxQyaGW84EmUHEXtot UGFVAHaJyiZ+G7Y0FMACpTGkzCJ4ZeOkZ9fMjDze2Rm0xaZi/o1lL76uJUjr1xV9 I9YGUX4d9+NvtC9FUiXvrzZIdVQaiQiqs2oE1cJF076ZYVUf6VoBcQyY5NtwM1Ue QhgSPl+7Vi4h/Mjbk2TvHOmNMRK1jh8Mu16n4dxMT84RJq56emfQQjpW469VhimY pl5tiJRf/tn9xsvbfnZeMCVnhg+ajPv67O93KQh+hOP497TqJ7CylngR9WKgxboQ m/GXRNZmm5dc3eOavZLI1PhVVM0KNUavmaGcxIaw/D6KPrjaGId1gAlmje8Y5FQe 3zhBXSPPGuM= =6tF3 -----END PGP SIGNATURE-----