IBM Support

Security Bulletin: IBM Informix Dynamic Server is affected to denial of service due to FasterXML jackson-databind (CVE-2020-36518)

Security Bulletin


Summary

There is a denial of service vulnerability in FasterXML jackson-databind (CVE-2020-36518) open source library included in IBM Informix Dynamic Server for IBM InformixHQ. FasterXML jackson-databind 2.13.2.2 resolves the vulnerability.

Vulnerability Details

CVEID:   CVE-2020-36518
DESCRIPTION:   FasterXML jackson-databind is vulnerable to a denial of service, caused by a Java StackOverflow exception. By using a large depth of nested objects, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/222319 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s)Version(s)
IBM Informix Dynamic Server14.10.x
IBM Informix Dynamic Server12.10.x

Remediation/Fixes

Based on current information and analysis, this vulnerability is only in the InformixHQ portion of the Informix Server product.

The affected jackson-databind version is included in InformixHQ, but InformixHQ does not allow users to pass arbitrary input to the vulnerable subroutine.

We realize that the vulnerable version of jackson-databind shows up in open source security scans for the InformixHQ component.

You may follow the steps below to upgrade the open source software.

For 14.10 IBM Informix Server

  1. Go to Fix Central:
  2. Download informixhq-server.jar and informixhq-agent.jar from Fix Central
  3. Stop InformixHQ server and InformixHQ agent
  4. Replace the existing informixhq-agent.jar and informixhq-server.jar files in the ${INFORMIXDIR}/hq directory with the new Informixhq-1.6.3 jar files in every affected installation.
  5. With these updates you can continue to use the InformixHQ startup scripts (InformixHQ.sh, InformixHQ.sh and InformixHQ.ksh) from $INFORMIXDIR/hq folder to start InformixHQ.

For 12.10 IBM Informix Server

  1. Go to Fix Central:
  2. Download informixhq-server.jar and informixhq-agent.jar from Fix Central
  3. Stop InformixHQ server and InformixHQ agent
  4. Replace the existing informixhq-agent.jar and informixhq-server.jar files in the ${INFORMIXDIR}/hq directory with the new Informixhq-1.6.3 jar files in every affected installation.
  5. With these updates you can continue to use the InformixHQ startup scripts (InformixHQ.sh, InformixHQ.sh and InformixHQ.ksh) from $INFORMIXDIR/hq folder to start InformixHQ.

 

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

03 May 2022: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSB2ML","label":"Informix Dynamic Server"},"Component":"InformixHQ","Platform":[{"code":"PF051","label":"Linux on IBM Z Systems"},{"code":"PF027","label":"Solaris"},{"code":"PF002","label":"AIX"},{"code":"PF010","label":"HP-UX"},{"code":"PF016","label":"Linux"},{"code":"PF031","label":"Ubuntu"},{"code":"PF043","label":"Red Hat"},{"code":"PF048","label":"SUSE"},{"code":"PF033","label":"Windows"}],"Version":"12.10.x, 14.10.x","Edition":"","Line of Business":{"code":"LOB10","label":"Data and AI"}}]

Document Information

Modified date:
01 June 2022

UID

ibm16579513