IBM Support

Security Bulletin: IBM Db2 Mirror for i is vulnerable to denial of service due to gson 217225

Security Bulletin


Summary

IBM Db2 Mirror for i setup and GUI use gson which is vulnerable to denial of service as described in the vulnerability details section. IBM has addressed the vulnerability for IBM Db2 Mirror for i.

Vulnerability Details

IBM X-Force ID:   217225
DESCRIPTION:   Google Gson is vulnerable to a denial of service, caused by the deserialization of untrusted data. By using the writeReplace() method, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 7.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/217225 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H)

Affected Products and Versions

Affected Product(s)Version(s)
IBM Db2 Mirror for i7.5
IBM Db2 Mirror for i7.4

Remediation/Fixes

IBM recommends addressing the vulnerability now.

The vulnerability can be fixed by applying a PTF to IBM i. Releases 7.5 and 7.4 of IBM Db2 Mirror for i are supported and will be fixed.

The PTF numbers containing the fix for this vulnerability are in the following table.  IBM recommends installing the group PTF rather than the individual fix. 

Affected Product(s)Version(s)

Group PTF Number
and Minimum Level
for Remediation

5770-DBM PTF Number
for Remediation
IBM Db2 Mirror for i7.5SF99951 level 1

SI77900

IBM Db2 Mirror for i7.4SF99668 level 17

SI77899

 

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

Change History

28 Jan 2022: Initial Publication
9 June 2022: Updated for Release 7.5

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Product":{"code":"SS9QQS","label":"IBM i 7.4"},"Component":"IBM Db2 Mirror for i","Platform":[{"code":"PF012","label":"IBM i"}],"Version":"7.4","Edition":"","Line of Business":{"code":"LOB57","label":"Power"}},{"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Product":{"code":"SWG60","label":"IBM i"},"Component":"IBM Db2 Mirror for i","Platform":[{"code":"PF012","label":"IBM i"}],"Version":"7.4,7.5","Edition":"","Line of Business":{"code":"LOB57","label":"Power"}},{"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Product":{"code":"SSLLPF","label":"IBM Db2 Mirror for i"},"Component":"","Platform":[{"code":"PF012","label":"IBM i"}],"Version":"7.4,7.5","Edition":"","Line of Business":{"code":"LOB57","label":"Power"}}]

Document Information

Modified date:
09 June 2022

UID

ibm16551988