-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0899
 Security Bulletin: IBM DB2 LUW contains a denial of service vulnerability
                               11 April 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM DB2 LUW
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Denial of Service -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-0215 CVE-2016-0211 

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg21979986
   http://www.ibm.com/support/docview.wss?uid=swg21979984

Comment: This bulletin contains two (2) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: IBM DB2 LUW contains a denial of service vulnerability
using a SELECT statement with subquery containing the AVG OLAP function on
Oracle compatible database (CVE-2016-0215)

Security Bulletin

Document information

More support for:

DB2 for Linux, UNIX and Windows

Software version:

9.7, 9.8, 10.1, 10.5

Operating system(s):

AIX, HP-UX, Linux, Solaris, Windows

Software edition:

Advanced Enterprise Server, Advanced Workgroup Server, Enterprise Server,
Express, Express-C, Personal, Workgroup Server

Reference #:

1979986

Modified date:

2016-04-07

Summary

IBM DB2 LUW contains a denial of service vulnerability. A remote,
authenticated DB2 user could exploit this vulnerability by issuing a SELECT
statment with subquery containing the AVG OLAP function on an Oracle
compatible database. This may cause the DB2 server to terminate abnormally.

Vulnerability Details

CVEID:

CVE-2016-0215

DESCRIPTION:

IBM DB2 LUW contains a denial of service vulnerability under special
circumstances. An authenticated attacker to issue a specially-crafted SELECT
statement that would cause disruption in the service.

CVSS Base Score: 3.1

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109671

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

All fix pack levels of IBM DB2 V9.7, V10.1 and V10.5 editions listed below
and running on AIX, Linux, HP, Solaris or Windows are affected.

IBM DB2 Express Edition

IBM DB2 Workgroup Server Edition

IBM DB2 Enterprise Server Edition

IBM DB2 Advanced Enterprise Server Edition

IBM DB2 Advanced Workgroup Server Edition

IBM DB2 Connect Application Server Edition

IBM DB2 Connect Enterprise Edition

IBM DB2 Connect Unlimited Edition for System i

IBM DB2 Connect Unlimited Edition for System z

The DB2 Connect products mentioned are affected only if a local database has
been created.

IBM DB2 pureScale Feature for Enterprise Server Edition, V9.8, running on AIX
or Linux is affected.

Remediation/Fixes

The recommended solution is to apply the appropriate fix for this
vulnerability.

FIX:

Customers running any vulnerable fixpack level of an affected Program, V9.7,
V10.1 and V10.5 can download the special build containing the interim fix for
this issue from Fix Central. These special builds are available based on the
most recent fixpack level for each impacted release: DB2 V9.7 FP11, DB2 V10.1
FP5 and DB2 V10.5 FP7. They can be applied to any affected fixpack level of
the appropriate release to remediate this vulnerability.

Refer to the following chart to determine how to proceed to obtain a needed
fixpack or special build.

Release		Fixed in fix pack	APAR		Download URL

V9.7		TBD			IT12673		Special Build for V9.7 FP11:
							
							AIX 64-bit

							HP-UX 64-bit	

							Linux 32-bit, x86-32

							Linux 64-bit, x86-64

							Linux 64-bit, POWER

							Linux 64-bit, System z, System z9 or zSeries

							Solaris 64-bit, SPARC

							Solaris 64-bit, x86-64

							Windows 32-bit, x86

							Windows 64-bit, x86

V9.8		TBD			IT13208		Please contact technical support.

V10.1		TBD			IT12669		Special Build for V10.1 FP5:

							AIX 64-bit

							HP-UX 64-bit

							Linux 32-bit, x86-32

							Linux 64-bit, x86-64

							Linux 64-bit, POWER

							Linux 64-bit, System z, System z9 or zSeries

							Solaris 64-bit, SPARC

							Solaris 64-bit, x86-64

							Windows 32-bit, x86

							Windows 64-bit, x86

V10.5		TBD			IT12675		Special Build for V10.5 FP7:

							AIX 64-bit

							HP-UX 64-bit
					
							Linux 32-bit, x86-32

							Linux 64-bit, x86-64

							Linux 64-bit, POWER

							Linux 64-bit, System z, System z9 or zSeries

							Solaris 64-bit, SPARC

							Solaris 64-bit, x86-64

							Windows 32-bit, x86

							Windows 64-bit, x86

							Linux 64-bit, POWER little endian on Power System

							Inspur

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to

My Notifications

to be notified of important product support alerts like this.

References

Complete CVSS v3 Guide

On-line Calculator v3

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Acknowledgement

None

Change History

April 7, 2016: Original Version Published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ---

Security Bulletin: IBM DB2 LUW contains a denial of service vulnerability in
which a malformated DRDA message may cause the DB2 server to terminate
abnormally (CVE-2016-0211)

Security Bulletin

Document information

More support for:

DB2 for Linux, UNIX and Windows

Software version:

9.7, 9.8, 10.1, 10.5

Operating system(s):

AIX, HP-UX, Linux, Solaris, Windows

Software edition:

Advanced Enterprise Server, Advanced Workgroup Server, Enterprise Server,
Express, Express-C, Personal, Workgroup Server

Reference #:

1979984

Modified date:

2016-04-07

Summary

IBM DB2 LUW contains a denial of service vulnerability. A remote,
authenticated DB2 user could exploit this vulnerability by issuing a
specially-crafted DRDA message and cause DB2 server to terminate abnormally.

Vulnerability Details

CVEID:

CVE-2016-0211

DESCRIPTION:

IBM DB2 LUW contains a denial of service vulnerability. A remote,
authenticated DB2 user could exploit this vulnerability by issuing a
specially-crafted DRDA message and cause DB2 server to terminate abnormally.

CVSS Base Score: 4.3

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109608

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

All fix pack levels of IBM DB2 V9.7, V10.1 and V10.5 editions listed below
and running on AIX, Linux, HP, Solaris or Windows are affected.

IBM DB2 Express Edition

IBM DB2 Workgroup Server Edition

IBM DB2 Enterprise Server Edition

IBM DB2 Advanced Enterprise Server Edition

IBM DB2 Advanced Workgroup Server Edition

IBM DB2 Connect Application Server Edition

IBM DB2 Connect Enterprise Edition

IBM DB2 Connect Unlimited Edition for System i

IBM DB2 Connect Unlimited Edition for System z

The DB2 Connect products mentioned are affected only if a local database has
been created.

IBM DB2 pureScale Feature for Enterprise Server Edition, V9.8, running on AIX
or Linux is affected.

Remediation/Fixes

The recommended solution is to apply the appropriate fix for this
vulnerability.

FIX:

Customers running any vulnerable fixpack level of an affected Program, V9.7,
V10.1 and V10.5 can download the special build containing the interim fix for
this issue from Fix Central. These special builds are available based on the
most recent fixpack level for each impacted release: DB2 V9.7 FP11, DB2 V10.1
FP5 and DB2 V10.5 FP7. They can be applied to any affected fixpack level of
the appropriate release to remediate this vulnerability.

Refer to the following chart to determine how to proceed to obtain a needed
fixpack or special build.

Release		Fixed in fix pack	APAR		Download URL

V9.7		TBD			IT12462		Special Build for V9.7 FP11:

							AIX 64-bit

							HP-UX 64-bit

							Linux 32-bit, x86-32

							Linux 64-bit, x86-64

							Linux 64-bit, POWER

							Linux 64-bit, System z, System z9 or zSeries

							Solaris 64-bit, SPARC

							Solaris 64-bit, x86-64

							Windows 32-bit, x86

							Windows 64-bit, x86

V9.8		TBD			IT13350		Please contact technical support.

V10.1		TBD			IT12487		Special Build for V10.1 FP5:

							AIX 64-bit

							HP-UX 64-bit

							Linux 32-bit, x86-32

							Linux 64-bit, x86-64

							Linux 64-bit, POWER

							Linux 64-bit, System z, System z9 or zSeries

							Solaris 64-bit, SPARC

							Solaris 64-bit, x86-64

							Windows 32-bit, x86

							Windows 64-bit, x86

V10.5		TBD			IT12488		Special Build for V10.5 FP7:

							AIX 64-bit

							HP-UX 64-bit

							Linux 32-bit, x86-32

							Linux 64-bit, x86-64

							Linux 64-bit, POWER

							Linux 64-bit, System z, System z9 or zSeries

							Solaris 64-bit, SPARC

							Solaris 64-bit, x86-64

							Windows 32-bit, x86

							Windows 64-bit, x86

							Linux 64-bit, POWER little endian on Power System

							Inspur

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to

My Notifications

to be notified of important product support alerts like this.

References

Complete CVSS v3 Guide

On-line Calculator v3

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Acknowledgement

None

Change History

April 7, 2016: Original Version Published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVwr5R36ZAP0PgtI9AQIZZw//UDSWGkpann58/bdO0iPRhg3mFH0rG3fn
ZPbThp8Ma6fep8PTrgV2V7rKLKmKUzdiD+qCfmKtuJ1bZ9EpqGsSWZ7dy2iKhcZr
7g/F6Imu5ecPNkShwsIei/MYLOKmfEQP1I3tNQrCDnh6wBNXSi4oAwITGy3XCvPN
lzMuFSAAkH6f6c8E3ABAtUDd3kw1UIzk2loWN/ypntVUONQNmWRy93hRWJqD+2e3
A9GFCyiuPN+WootqBTibQSZKRXthg8rIDZPgnw7rJxS/CdZcjcAje+5ZLIbuk1SM
rUgcb6W6c5fx6/LrHEGaKq6/ZeqdIEJLtGeLkpQtMg6RFGOGvOCgbGC2AKZlGcsi
+e7UL+oTKrca9T1bsjCRq8mckenaOQMeqMEl5Yb4bw8vdQeON+m51NbFDFSvvRuq
uBDzv8+aRENVD9VpDKHGXp6iZnqrzcuWwQhFO0WvV+13ablUgEhE2nEg1hMsd1a9
zbCY8p6X91aAm5IbPG4Y00yS9dgehNDQUjIge1K1x8no85r/rJvIj/ioMz00Y52D
TVJPp4l6vwSsx1iPVgvFQ/97WNmNFFYyWs6YhXQevzKlnwJxgocuiovCqHd9lPXu
dVj/VVIavDOzJd1Kn5XdUxD+4M/eYY3ymj227pPsJPE9r7xRxbnSpirhNwaZhIpp
O1AIMkfG59Q=
=uPvv
-----END PGP SIGNATURE-----