Lucene search

K
ibmIBMF0E311621C9ECACD76EFBCD70F0B00B2BFEDD76322433B7F1967431AB3D120CA
HistoryJun 16, 2018 - 1:11 p.m.

Security Bulletin: IBM Java SDK Vulnerability affect IBM DB2 Accessories Suite for Linux, Unix and Windows (CVE-2015-0383)

2018-06-1613:11:31
www.ibm.com
7

5.4 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:P/A:C

Summary

There is vulnerability in IBM® SDK Java™ Technology Edition, Version 6 that is used by IBM DB2 Accessories Suite for Linux, Unix and Windows. These issues were disclosed as part of the IBM Java SDK updates in January 2015.

Vulnerability Details

CVEID: CVE-2015-0383 DESCRIPTION: An unspecified vulnerability in Oracle Java SE and JRockit related to the Hotspot component has no confidentiality impact, partial integrity impact, and complete availability impact.
CVSS Base Score: 5.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/100148 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:M/Au:N/C:N/I:P/A:C)

Affected Products and Versions

  • IBM DB2 Accessories Suite for Linux, UNIX and Windows 10.5 (Applicable for Solaris and HP-UX platform only):

Remediation/Fixes

Check the accSuiteRelease.properties file located in <DB2_install_dir>/db2tss. If the accSuiteRelease.properties file does not exist, or if the properties file exists, but the version number in the properties file is less than V2.3.0, reinstallation of the latest release is necessary:

1. Download the Accessories Suite and extract the installer.
2. Stop the text search service: db2ts stop for text
3. Run the installer to upgrade your existing setup

For more information see:
http://www-01.ibm.com/support/knowledgecenter/SSEPGG_10.5.0/com.ibm.db2.luw.admin.ts.doc/doc/t0058556.html

Workarounds and Mitigations

None

CPENameOperatorVersion
db2 for linux, unix and windowseq10.5

5.4 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:P/A:C