Lucene search

K
ibmIBM89C362D2695DE993520D31C76EBC60A0A071D8F2C3A7802BA1D58182B320ED3D
HistoryApr 10, 2024 - 5:27 p.m.

Security Bulletin: IBM® Db2® is affected by a vulnerability in an open source library boost (CVE-2012-2677)

2024-04-1017:27:09
www.ibm.com
13
ibm® db2® vulnerability
boost library
cve-2012-2677
fix pack
v11.1.4
v11.5.9

7 High

AI Score

Confidence

High

0.014 Low

EPSS

Percentile

86.4%

Summary

IBM® Db2® is affected by a vulnerability in an open source library boost.

Vulnerability Details

CVEID:CVE-2012-2677
**DESCRIPTION:**Boost is vulnerable to a buffer overflow, caused by improper bounds checking by the ordered_malloc() function. By persuading a victim to open a specially-crafted file, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
CVSS Base score: 6.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/76650 for the current score.
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Affected Products and Versions

Affected Product(s) Version(s) Applicable Editions
IBM® Db2®

11.1.4.x

|

Server

IBM® Db2®|

11.5.x

|

Server

Only Linux 64-bit, x86-64 and Linux 64-bit, POWER™ little endian platforms are affected. Linux 32-bit, x86-32, Linux 64-bit, System z®, System z9® or zSeries®, Unix, Windows are not affected.

Remediation/Fixes

Customers running any vulnerable fixpack level of an affected Program, v11.1, V11.5, can download the special build containing the interim fix for this issue from Fix Central. These special builds are available based on the most recent fixpack level for each impacted release: V11.1.4 FP7, V11.5.9. They can be applied to any affected fixpack level of the appropriate release to remediate this vulnerability.

Release Fixed in fix pack APAR Download URL
V11.1 TBD DT270330 Special Build for V11.1.4 FP7:

Linux 64-bit, x86-64
Linux 64-bit, POWER™ little endian

V11.5| TBD| DT270330|

Db2 V11.5.0 is not affected.

Special Build for V11.5.8:

Linux 64-bit, x86-64
Linux 64-bit, POWER™ little endian

Special Build for V11.5.9:

Linux 64-bit, x86-64
Linux 64-bit, POWER™ little endian

IBM does not disclose key Db2 functionality nor replication steps for a vulnerability to avoid providing too much information to any potential malicious attacker. IBM does not want to enable a malicious attacker with sufficient knowledge to craft an exploit of the vulnerability.

Workarounds and Mitigations

None

7 High

AI Score

Confidence

High

0.014 Low

EPSS

Percentile

86.4%

Related for 89C362D2695DE993520D31C76EBC60A0A071D8F2C3A7802BA1D58182B320ED3D