-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0093
Executing a query with an OLAP specification on the IBM InfoSphere Balanced
Warehouse C3000, C4000, D5100, IBM Smart Analytics System 1050, 2050, 5600,
    5710, 7600 causes the DB2 server to terminate database connections
                              23 January 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Smart Analytics System
Publisher:         IBM
Operating System:  AIX
                   Linux variants
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-6717  

Reference:         ESB-2013.1816

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21659490

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Executing a query with an OLAP specification on the IBM 
InfoSphere Balanced Warehouse C3000, C4000, D5100, IBM Smart Analytics System 
1050, 2050, 5600, 5710, 7600 causes the DB2 server to terminate database 
connections (CVE-2013-6717)

Security Bulletin

Document information

More support for:

IBM Smart Analytics System

Software version:

9.7, 10.1

Operating system(s):

AIX 6.1, Linux

Reference #:

1659490

Modified date:

2014-01-21


Summary

A vulnerability in IBM DB2 could allow a remote, authenticated user to cause a 
DB2 LUW server to terminate all connections to a database and deactivate the 
database. This only affects the database which the user is connected to.

Vulnerability Details

CVE ID: CVE-2013-6717

DESCRIPTION:

The IBM InfoSphere Balanced Warehouse C3000, C4000 and D5100, IBM Smart 
Analytics System 1050, 2050, 5600, 5710, and 7600 ships with either DB2 9.7 or 
DB2 10.1. There is a security vulnerability which could allow a remote, 
authenticated user to exploit a vulnerability in the DB2 OLAP query engine to 
cause the DB2 server instance to terminate all connections to a database and 
deactivate the database. This only affects the database that the user is 
connected to. The vulnerability does not shut down the DB2 server instance.


CVSS:

CVSS Base Score: 3.5

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/89116 for the 
current score


CVSS Environmental Score*: Undefined

CVSS String: (AV:N/AC:M/Au:S/C:N/I:N/A:P)

Affected Products

IBM InfoSphere Balanced Warehouse C3000

IBM InfoSphere Balanced Warehouse C4000

IBM InfoSphere Balanced Warehouse D5100

IBM Smart Analytics System 1050

IBM Smart Analytics System 2050

IBM Smart Analytics System 5600

IBM Smart Analytics System 5710

IBM Smart Analytics System 7600

Remediation/Fixes

Find your product in the table below and use the link in the Download URL 
column to find the patch provided by IBM.

For more information about IBM registration IDs, see the IBM Registration
FAQ page.


Product 				Version 	APAR 		Download URL

IBM InfoSphere Balanced Warehouse C3000	DB2 9.7 	IC95641 	DB2 9.7 FP9
IBM InfoSphere Balanced Warehouse C4000
IBM InfoSphere Balanced Warehouse D5100
IBM Smart Analytics System 1050
IBM Smart Analytics System 2050
IBM Smart Analytics System 5600 V1
IBM Smart Analytics System 5600 V2 
	
IBM Smart Analytics System 5600 V3 	DB2 9.7 	IC95641 	Contact technical support.

IBM Smart Analytics System 5600 V3 	DB2 10.1 	IC97737 	Contact technical support.

IBM Smart Analytics System 5710		DB2 9.7 	IC95641 	DB2 9.7 FP9
IBM Smart Analytics System 7600 	


Contact Technical Support:

In the United States and Canada dial 1-800-IBM-SERV

View the support contacts for other countries outside of the United States.

Electronically open a Service Request with DB2 technical support.

Workarounds/Mitigations

None

References:

Complete CVSS Guide

On-line Calculator V2

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Change History

January 21, 2014: Original version published.

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of 
this vulnerability in their environments by accessing the links in the 
Reference section of this Security Bulletin.

Note: According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Cross reference information 
Segment 		Product 			Component 				Platform 	Version 	Edition

Information Management 	InfoSphere Balanced Warehouse 	Balanced Warehouse C Class - C4000 	Linux, Windows 	9.7 	

Information Management 	InfoSphere Balanced Warehouse 	Balanced Warehouse D Class - D5100 	Linux 		9.7 	

Information Management 	IBM Smart Analytics System 	IBM Smart Analytics System 1050 	Linux, Windows 	9.7 	

Information Management 	IBM Smart Analytics System 	IBM Smart Analytics System 2050 	Linux, Windows 	9.7 	

Information Management 	IBM Smart Analytics System 	IBM Smart Analytics System 5600 	Linux 		9.7, 10.1 	

Information Management 	IBM Smart Analytics System 	IBM Smart Analytics System 5710 	Linux 		9.7 	

Information Management 	IBM Smart Analytics System 	IBM Smart Analytics System 7600 	AIX 6.1 	9.7 	

Information Management 	InfoSphere Balanced Warehouse 	Balanced Warehouse C Class - C3000 	Linux, Windows 	9.7

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBUuCb8RLndAQH1ShLAQJGyg/+O999yEeabWKxWXTWIWrVaErsBA5Wea8z
jQ2FI3V8+i/98XCFr6S11obHDZ8k/XfNN5VDqUXlu9Su7EPiLURtAcUzF6xn8sf+
TKXDxmKqA06978KpRZ5fl3CwqNye/xOyGIbMGDfkr/p3c9Nj1RZapLlcm/JOppdG
JXsROEJuLusY2aIf+fGNsnRrEU1c/d7hXcClmjaZAc0ZS0TGFrmotyvZtiCsCUVO
4ykmVQ1/LpzslKz0TvYwUIAaQE96oDYuOZkFqJJxZbRRyUWMgvSBoihbrRLbg8OH
MxIibeZAtzZ/8VIfVc720XVMLpO9dg8+tibxWfMrUZrCJFfxQyaGW84EmUHEXtot
UGFVAHaJyiZ+G7Y0FMACpTGkzCJ4ZeOkZ9fMjDze2Rm0xaZi/o1lL76uJUjr1xV9
I9YGUX4d9+NvtC9FUiXvrzZIdVQaiQiqs2oE1cJF076ZYVUf6VoBcQyY5NtwM1Ue
QhgSPl+7Vi4h/Mjbk2TvHOmNMRK1jh8Mu16n4dxMT84RJq56emfQQjpW469VhimY
pl5tiJRf/tn9xsvbfnZeMCVnhg+ajPv67O93KQh+hOP497TqJ7CylngR9WKgxboQ
m/GXRNZmm5dc3eOavZLI1PhVVM0KNUavmaGcxIaw/D6KPrjaGId1gAlmje8Y5FQe
3zhBXSPPGuM=
=6tF3
-----END PGP SIGNATURE-----