Headline
CVE-2019-4448: Security Bulletin: Multiple privilege escalation vulnerabilities in IBM DB2 HPU
IBM DB2 High Performance Unload load for LUW 6.1, 6.1.0.1, 6.1.0.1 IF1, 6.1.0.2, 6.1.0.2 IF1, and 6.1.0.1 IF2 db2hpum and db2hpum_debug binaries are setuid root and have built-in options that allow an low privileged user the ability to load arbitrary db2 libraries from a privileged context. This results in arbitrary code being executed with root authority. IBM X-Force ID: 163489.
Security Bulletin
Summary
IBM DB2 High Performance Unload load privilege escalation in IBM DB2 HPU debug binary via trusted PATH and privilege escalation in IBM DB2 HPU via loading DB2 library
Vulnerability Details
Relevant CVE Information:
CVEID: CVE-2019-4447
DESCRIPTION: IBM DB2 High Performance Unload load shared libraries from an untrusted path potentially giving low privilege user full access to root by loading a malicious shared library.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/163488 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVEID: CVE-2019-4448
DESCRIPTION: IBM DB2 High Performance Unload executes binaries from an untrusted path which could allow a local user to execute arbitrary code as the root user.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/163489 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Affected Products and Versions
DB2 High Performance Unload load for LUW 6.1
DB2 High Performance Unload load for LUW 6.1.0.1
DB2 High Performance Unload load for LUW 6.1.0.1 IF1
DB2 High Performance Unload load for LUW 6.1.0.2
DB2 High Performance Unload load for LUW 6.1.0.2 IF1
DB2 High Performance Unload load for LUW 6.1.0.2 IF2
Remediation/Fixes
Product
VRMF
Remediation/First Fix
InfoSphere Optim High Performance Unload for DB2 for Linux- UNIX and Windows
had been fixed in V6.1.0.3
https://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm%7EInformation%20Management&product=ibm/Information+Management/Optim+High+Performance+Unload+for+DB2+Linux+UNIX+and+Windows&release=6.1.0.3&platform=All&function=all
Workarounds and Mitigations
N/A
References
Off
Acknowledgement
The vulnerability was reported to IBM by Rich Mirch
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
[{"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Product":{"code":"SSC6UE","label":"Optim High Performance Unload for DB2 for Linux, UNIX and Windows"},"Component":"","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"6.1,6.1.0.1,6.1.0.1 IF1,6.1.0.2,6.1.0.2 IF1,6.1.0.1 IF2","Edition":"","Line of Business":{"code":"LOB10","label":"Data and AI"}}]
Related news
IBM DB2 High Performance Unload load for LUW 6.1, 6.1.0.1, 6.1.0.1 IF1, 6.1.0.2, 6.1.0.2 IF1, and 6.1.0.1 IF2 db2hpum_debug is a setuid root binary which trusts the PATH environment variable. A low privileged user can execute arbitrary commands as root by altering the PATH variable to point to a user controlled location. When a crash is induced the trojan gdb command is executed. IBM X-Force ID: 163488.