IBM® Db2® federated server is affected by vulnerabilities in the open source commons-configuration2 library when using the NoSQL Hadoop wrapper.
CVEID:CVE-2024-29131
**DESCRIPTION:**Apache Commons Configuration could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds write vulnerability. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 7.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/286004 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
CVEID:CVE-2024-29133
**DESCRIPTION:**Apache Commons Configuration could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds write vulnerability. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 7.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/286005 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Affected Product(s) | Version(s) | Applicable Editions |
---|---|---|
IBM® Db2® |
11.1.4 - 11.1.4.7
|
Server
IBM® Db2®|
11.5.8 - 11.5.9
|
Server
Linux platform is affected. Unix and Windows are not affected.
Earlier releases (10.1, 9.7 etc.) may also be affected, but they are no longer supported.
To determine if Federation is enabled, issue the following:
db2 get dbm cfg | grep FEDERATED
If a value of NO is returned, you are not vulnerable.
You can determine if you are using one of the affected wrappers by performing:
To determine if the NoSQL hadoop wrapper is in use, issue the following statement:
db2 “select * from syscat.servers where servertype = ‘HDFSPARQUET’”
If 1 or more rows are returned, then NoSQL hadoop wrapper is in use.
Customers running any vulnerable fixpack level of an affected Program,v11.1 and V11.5, can download the special build containing the interim fix for this issue from Fix Central. These special builds are available based on the most recent fixpack level for each impacted release: V11.1.4 FP7, and V11.5.9. They can be applied to any affected fixpack level of the appropriate release to remediate this vulnerability.
Release | Fixed in fix pack | APAR | Download URL |
---|---|---|---|
V11.1 | TBD | DT380983 | Special Build for V11.1.4 FP7: |
Linux 32-bit, x86-32
Linux 64-bit, x86-64
Linux 64-bit, POWER™ little endian
Linux 64-bit, System z®, System z9® or zSeries®
V11.5| TBD| DT380983|
Special Build #42458 or later for V11.5.8 available at this link:
<https://www.ibm.com/support/pages/node/6856211>
Special Build #42449 or later for V11.5.9 available at this link:
<https://www.ibm.com/support/pages/node/7087189>
IBM does not disclose key Db2 functionality nor replication steps for a vulnerability to avoid providing too much information to any potential malicious attacker. IBM does not want to enable a malicious attacker with sufficient knowledge to craft an exploit of the vulnerability.
None
CPE | Name | Operator | Version |
---|---|---|---|
db2 for linux, unix and windows | eq | 11.1 | |
db2 for linux, unix and windows | eq | 11.5 |