Lucene search

K
ibmIBM516B46A51ABB0D354081922EDC0111780454E8B8A2D982A240026DD0B71F2DEE
HistoryMar 06, 2020 - 6:40 p.m.

Security Bulletin: Privilege escalation vulnerability affects IBM® Db2® Administrative Task Scheduler (CVE-2018-1711).

2020-03-0618:40:24
www.ibm.com
13

0.0004 Low

EPSS

Percentile

5.1%

Summary

Db2 Administrative Task Scheduler (ATS) is vulnerable to a privilege escalation attack. A user with appropriate authorization can modify the contents of the control tables used by the ATS to permit unauthorized access to user data. Unauthorized access includes both access to authorizations held by other users as well as RCAC row permissions and column masks.

Vulnerability Details

CVEID: CVE-2018-1711 DESCRIPTION: IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) could allow a local user to to gain privileges due to allowing modification of columns of existing tasks.
CVSS Base Score: 8.4
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/146369&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

All fix pack levels of IBM Db2 V9.7, V10.1, V10.5 and V11.1 editions on all platforms are affected.

Remediation/Fixes

The recommended solution is to apply the appropriate fix for this vulnerability.

FIX:

The fix for DB2 release V11.1 is in V11.1.4.4 iFix001, available for download from Fix Central.

Customers running any vulnerable fixpack level of an affected Program, V9.7, V10.1, and V10.5, can download the special build containing the interim fix for this issue from Fix Central. These special builds are available based on the most recent fixpack level for each impacted release: DB2 V9.7 FP11, V10.1 FP6, and V10.5 FP10. They can be applied to any affected fixpack level of the appropriate release to remediate this vulnerability.

Release Fixed in fix pack APAR Download URL
V9.7 TBD

IT25824

IT27411

| Special Build for V9.7 FP11:

AIX 64-bit
HP-UX 64-bit
Linux 32-bit, x86-32
Linux 64-bit, x86-64
Linux 64-bit, POWER™ big endian
Linux 64-bit, System z®, System z9® or zSeries®
Solaris 64-bit, SPARC
Solaris 64-bit, x86-64
Windows 32-bit, x86
Windows 64-bit, x86

V10.1 | TBD | IT25825
IT27410 | Special Build for V10.1 FP6:

AIX 64-bit
HP-UX 64-bit
Linux 32-bit, x86-32
Linux 64-bit, x86-64
Linux 64-bit, POWER™ big endian
Linux 64-bit, System z®, System z9® or zSeries®
Solaris 64-bit, SPARC
Solaris 64-bit, x86-64
Windows 32-bit, x86
Windows 64-bit, x86

V10.5 | FP11 | IT25826
IT27385 | <https://www.ibm.com/support/pages/node/3500079&gt;

V11.1.4.4 | iFix001 | IT25813
IT27409 | [https://www-01.ibm.com/support/docview.wss?uid=ibm1087475](< https://www-01.ibm.com/support/docview.wss?uid=ibm10874752&gt;)

Workarounds and Mitigations

If you rely on ATS, the only solution is to apply the fix, but you may consider using the Db2 or other audit facility to ensure no malicious changes are made to the affected tables. If ATS is turned off, you are not vulnerable.

0.0004 Low

EPSS

Percentile

5.1%

Related for 516B46A51ABB0D354081922EDC0111780454E8B8A2D982A240026DD0B71F2DEE