Security Bulletin
Summary
The Db2 JDBC driver deserializes an object unsafely potentially leading to arbitrary code execution.
Vulnerability Details
CVEID: CVE-2017-1677
DESCRIPTION: IBM Data Server Driver for JDBC and SQLJ deserializes the contents of /tmp/connlicj.bin which leads to object injection and potentially arbitrary code execution depending on the classpath.
CVSS Base Score: 7.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/133999 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
Affected Products and Versions
All fix pack levels of IBM Db2 V9.7, V10.1, V10.5, and V11.1 editions on all platforms are affected.
Remediation/Fixes
The recommended solution is to apply the appropriate fix for this vulnerability.
FIX:
The fix for DB2 V11.1 is in V11.1.3 FP3, available for download from Fix Central.
Customers running any vulnerable fixpack level of an affected Program, V9.7, V10.1, and V10.5, can download the special build containing the interim fix for this issue from Fix Central. These special builds are available based on the most recent fixpack level for each impacted release: DB2 V9.7 FP11, V10.1 FP6, and V10.5 FP9. They can be applied to any affected fixpack level of the appropriate release to remediate this vulnerability.
Workarounds and Mitigations
The user can set the default output directory to a more secure location for the connlicj.bin file by modifying the db2.jcc.outputDirectory property. The driver will write the cache file to the configured location which cannot be accessed without proper authorization, which will avoid the object injection.
Get Notified about Future Security Bulletins
References
Acknowledgement
The vulnerability was reported to IBM by Martin Strand.
Change History
March 14, 2018: Original Version Published.
March 23, 2018: Published remaining platforms for V9.7.
July 11, 2018: Updated 10.5 version with a link to 10.5 FP10 image and corrected JCC version numbers.
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
16 July 2018
UID
swg22012896