IBM Support

Security Bulletin: Due to use of Apache Log4j, OmniFind Text Search Server for DB2 for i is vulnerable to arbitrary code execution (CVE-2021-4104)

Security Bulletin


Summary

There is a vulnerability in Apache Log4j (CVE-2021-4104) as described in the vulnerability details section. Apache Log4j v1 is used by OmniFind Text Search Server for DB2 for i for generating logs and diagnostic traces in some of its components. IBM has addressed the vulnerability in OmniFind Text Search Server for DB2 for i by removing Apache Log4j.

Vulnerability Details

CVEID:   CVE-2021-4104
DESCRIPTION:   Apache Log4j could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of untrusted data when the attacker has write access to the Log4j configuration. If the deployed application is configured to use JMSAppender, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 8.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/215048 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s)Version(s)
OmniFind Text Search Server for DB2 for i

V1R6M0
V1R5M0
V1R4M0
V1R3M0

 

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now.

The issue can be fixed by applying PTFs to IBM i.  Releases V1R6M0(7.5), V1R5M0(7.4), V1R4M0(7.3), and V1R3M0(7.2) of OmniFind Text Search Server for DB2 for i will be fixed.

The IBM i PTF numbers containing the fix for the CVE:

OmniFind Text Search Server for DB2 for i ReleaseIBM i ReleasePTF Number
V1R6M07.5SI78636
SI78665
SI78673
V1R5M07.4SI78753
SI78754
SI78755
V1R4M07.3SI78756
SI78757
SI78758
V1R3M07.2SI78751
SI78759
SI78760
SI78761


https://www.ibm.com/support/fixcentral

Important note: IBM recommends that all users running unsupported versions of affected products upgrade to supported and fixed version of affected products.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

Change History

09 March 2022: Initial Publication
06 May 2022: Updated to include IBM i Release 7.5 (V1R6M0) fix information

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Product":{"code":"SS9QQS","label":"IBM i 7.4"},"Component":"","Platform":[{"code":"PF012","label":"IBM i"}],"Version":"7.4","Edition":"","Line of Business":{"code":"LOB57","label":"Power"}},{"Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Product":{"code":"SSC5L9","label":"IBM i 7.2"},"Component":"","Platform":[{"code":"PF012","label":"IBM i"}],"Version":"7.2","Edition":"","Line of Business":{"code":"LOB08","label":"Cognitive Systems"}},{"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Product":{"code":"SWG60","label":"IBM i"},"Component":"","Platform":[{"code":"PF012","label":"IBM i"}],"Version":"7.5.0,7.4.0, 7.3.0, 7.2.0","Edition":"","Line of Business":{"code":"LOB57","label":"Power"}},{"Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Product":{"code":"SSTS2D","label":"IBM i 7.3"},"Component":"","Platform":[{"code":"PF012","label":"IBM i"}],"Version":"7.3","Edition":"","Line of Business":{"code":"LOB08","label":"Cognitive Systems"}},{"Business Unit":{"code":"BU009","label":"Systems - Server"},"Product":{"code":"SSB2FU","label":"OmniFind Text Search Server for Db2 for i"},"Component":"","Platform":[{"code":"PF012","label":"IBM i"}],"Version":"1.6.0,1.5.0,1.4.0,1.3.0","Edition":""}]

Document Information

Modified date:
06 May 2022

UID

ibm16562237