IBM DB2 LUW contains a denial of service vulnerability. A remote, authenticated DB2 user could exploit this vulnerability by issuing a SELECT statment with subquery containing the AVG OLAP function on an Oracle compatible database. This may cause the DB2 server to terminate abnormally.
CVEID: CVE-2016-0215**
DESCRIPTION:** IBM DB2 LUW contains a denial of service vulnerability under special circumstances. An authenticated attacker to issue a specially-crafted SELECT statement that would cause disruption in the service.
CVSS Base Score: 3.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109671 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)
All fix pack levels of IBM DB2 V9.7, V10.1 and V10.5 editions listed below and running on AIX, Linux, HP, Solaris or Windows are affected.
IBM® DB2® Express Edition
IBM® DB2® Workgroup Server Edition
IBM® DB2® Enterprise Server Edition
IBM® DB2® Advanced Enterprise Server Edition
IBM® DB2® Advanced Workgroup Server Edition
IBM® DB2® Connect™ Application Server Edition
IBM® DB2® Connect™ Enterprise Edition
IBM® DB2® Connect™ Unlimited Edition for System i®
IBM® DB2® Connect™ Unlimited Edition for System z®
The DB2 Connect products mentioned are affected only if a local database has been created.
IBM® DB2® pureScale™ Feature for Enterprise Server Edition, V9.8, running on AIX or Linux is affected.
The recommended solution is to apply the appropriate fix for this vulnerability.
FIX:
The fix for DB2 and DB2 Connect release V10.1 is in V10.1 FP6 and V10.5 is in V10.5 FP8, are available for download from Fix Central.
Customers running any vulnerable fixpack level of an affected Program, V9.7 can download the special build containing the interim fix for this issue from Fix Central. These special builds are available based on the most recent fixpack level for each impacted release: DB2 V9.7 FP11. They can be applied to any affected fixpack level of the appropriate release to remediate this vulnerability.
Refer to the following chart to determine how to proceed to obtain a needed fixpack or special build.
Release | Fixed in fix pack | APAR | Download URL |
---|---|---|---|
V9.7 | TBD | IT12673 | Special Build for V9.7 FP11: |
AIX 64-bit | |||
HP-UX 64-bit | |||
Linux 32-bit, x86-32 | |||
Linux 64-bit, x86-64 | |||
Linux 64-bit, POWER™ | |||
Linux 64-bit, System z®, System z9® or zSeries® | |||
Solaris 64-bit, SPARC | |||
Solaris 64-bit, x86-64 | |||
Windows 32-bit, x86 | |||
Windows 64-bit, x86 | |||
V9.8 | TBD | IT13208 | Please contact technical support. |
V10.1 | FB6 | IT12669 | http://www.ibm.com/support/docview.wss?uid=swg24043366 |
V10.5 | FP8 | IT12675 | <http://www.ibm.com/support/docview.wss?uid=swg24042680> |
None