IBM DB2 LUW contains a denial of service vulnerability. A remote, authenticated DB2 user could exploit this vulnerability by issuing a SELECT statment with subquery containing the AVG OLAP function on an Oracle compatible database. This may cause the DB2 server to terminate abnormally.
DESCRIPTION: IBM DB2 LUW contains a denial of service vulnerability under special circumstances. An authenticated attacker to issue a specially-crafted SELECT statement that would cause disruption in the service.
CVSS Base Score: 3.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109671 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)
Affected Products and Versions
All fix pack levels of IBM DB2 V9.7, V10.1 and V10.5 editions listed below and running on AIX, Linux, HP, Solaris or Windows are affected.
IBM® DB2® Express Edition
IBM® DB2® Workgroup Server Edition
IBM® DB2® Enterprise Server Edition
IBM® DB2® Advanced Enterprise Server Edition
IBM® DB2® Advanced Workgroup Server Edition
IBM® DB2® Connect™ Application Server Edition
IBM® DB2® Connect™ Enterprise Edition
IBM® DB2® Connect™ Unlimited Edition for System i®
IBM® DB2® Connect™ Unlimited Edition for System z®
The DB2 Connect products mentioned are affected only if a local database has been created.
IBM® DB2® pureScale™ Feature for Enterprise Server Edition, V9.8, running on AIX or Linux is affected.
The recommended solution is to apply the appropriate fix for this vulnerability.
The fix for DB2 and DB2 Connect release V10.1 is in V10.1 FP6 and V10.5 is in V10.5 FP8, are available for download from Fix Central.
Customers running any vulnerable fixpack level of an affected Program, V9.7 can download the special build containing the interim fix for this issue from Fix Central. These special builds are available based on the most recent fixpack level for each impacted release: DB2 V9.7 FP11. They can be applied to any affected fixpack level of the appropriate release to remediate this vulnerability.
Refer to the following chart to determine how to proceed to obtain a needed fixpack or special build.
|Release||Fixed in fix pack||APAR||Download URL|
|V9.7||TBD||IT12673|| Special Build for V9.7 FP11: |
Linux 32-bit, x86-32
Linux 64-bit, x86-64
Linux 64-bit, POWER™
Linux 64-bit, System z®, System z9® or zSeries®
Solaris 64-bit, SPARC
Solaris 64-bit, x86-64
Windows 32-bit, x86
Windows 64-bit, x86
|V9.8||TBD||IT13208||Please contact technical support.|
Workarounds and Mitigations
Get Notified about Future Security Bulletins
April 7, 2016: Original Version Published
May 3, 2016: Added special notes for V9.7 Windows SB images.
May 13, 2016: Updated download links for V9.7 Windows SB images.
Sept 15, 2016: Updated bulletin to indicate fix now available in V10.5 FP8.
Feb 28, 2016: Updated bulletin to indicate fix now available in V10.1 FP6.
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
16 June 2018