IBM DB2 for LUW bundles a XMLC library that is affected by CVE-2016-0729. A remote, authenticated DB2 user could exploit this vulnerability by issuing a specially crafted statement. This may cause the DB2 server to terminate abnormally or execute arbitary code.
Description: Apache Xerces-C XML Parser library is vulnerable to a denial of service, caused by improper bounds checking during processing and error reporting. By sending specially crafted input documents, an attacker could exploit this vulnerability to cause the library to crash or possibly execute arbitrary code on the system.
CVSS Base Score: 7.3
CVSS Temporal Score: https://exchange.xforce.ibmcloud.com/vulnerabilities/111028 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Description: Apache Xerces-C XML Parser library is vulnerable to a denial of service, caused by a stack-based buffer overflow when parsing a deeply nested DTD. A remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base Score: 5.3
CVSS Temporal Score: https://exchange.xforce.ibmcloud.com/vulnerabilities/114596 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Affected Products and Versions
All fix pack levels of IBM DB2 V9.7, V10.1, V10.5 and V11.1 editions listed below and running on AIX, Linux, HP, Solaris or Windows are affected
IBM® DB2® Express Edition
IBM® DB2® Workgroup Server Edition
IBM® DB2® Enterprise Server Edition
IBM® DB2® Advanced Enterprise Server Edition
IBM® DB2® Advanced Workgroup Server Edition
IBM® DB2® Direct Advanced Edition
IBM® DB2® Direct Standard Edition
IBM® DB2® Connect™ Application Server Edition
IBM® DB2® Connect™ Enterprise Edition
IBM® DB2® Connect™ Unlimited Edition for System i®
IBM® DB2® Connect™ Unlimited Edition for System z®
The DB2 Connect products mentioned are affected only if a local database has been created.
The recommended solution is to apply the appropriate fix for this vulnerability.
The fix for DB2 and DB2 Connect release is in V10.1 FP6, V10.5 FP8 and V11.1.1 FP1, available for download from Fix Central.
Customers running any vulnerable fixpack level of an affected Program, V9.7 can download the special build containing the interim fix for this issue from Fix Central. These special builds are available based on the most recent fixpack level for each impacted release: DB2 V9.7 FP11. They can be applied to any affected fixpack level of the appropriate release to remediate this vulnerability.
Refer to the following chart to determine how to proceed to obtain a needed fixpack or special build.
*** NOTICE: The DB2 V9.7 AIX Universal install image available before October 13, 2016 has installation problems. The problem has been corrected and you can use the link in the table to download it.
|Release||Fixed in fix pack||APAR||Download URL|
|V9.7||TBD||IT15576||Special Build for V9.7 FP11: |
AIX 64-bit *** See above note.
Linux 32-bit, x86-32
Linux 64-bit, x86-64
Linux 64-bit, POWER™
Linux 64-bit, System z®, System z9® or zSeries®
Solaris 64-bit, SPARC
Solaris 64-bit, x86-64
Windows 32-bit, x86
Windows 64-bit, x86
Workarounds and Mitigations
Get Notified about Future Security Bulletins
September 15, 2016: Original version published.
September 16, 2016: Previous V11.1 Windows 64-bit special build reported wrong DB2 level. Entered new URL for corrected version.
September 20, 2016, Previous V10.1 Windows 64-bit special build reported wrong DB2 level. Entered new URL for corrected version.
October 5, 2016. DB2 V9.7 special build for AIX has installation problems. The universal install file has been replace with server install file.
October 14, 2016. Corrected the DB2 V9.7 special build for AIX installation problem. The download URL now points to the universal install file.
October 28, 2016. Added notification of bad DB2 V9.7 special build for AIX.
December 15, 2016: Updated bulletin with V11.1.1 FP1 Fix Central URL.
February 28, 2017: Updated bulletin with V10.1 FP6 Fix Central URL.
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
16 June 2018