IBM DB2 10.5 < Fix Pack 7 Multiple Vulnerabilities (Bar Mitzvah) (FREAK) (Logjam)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote database server is affected by multiple vulnerabilities.

Description :

According to its version, the installation of IBM DB2 10.5 running on
the remote host is prior to Fix Pack 7. It is, therefore, affected by
the following vulnerabilities :

- A security feature bypass vulnerability, known as FREAK
(Factoring attack on RSA-EXPORT Keys), exists due to the
support of weak EXPORT_RSA cipher suites with keys less
than or equal to 512 bits. A man-in-the-middle attacker
may be able to downgrade the SSL/TLS connection to use
EXPORT_RSA cipher suites which can be factored in a
short amount of time, allowing the attacker to intercept
and decrypt the traffic. (CVE-2015-0204)

- A denial of service vulnerability exists when processing
an ECParameters structure due to an infinite loop that
occurs when a specified curve is over a malformed binary
polynomial field. A remote attacker can exploit this to
perform a denial of service against any system that
processes public keys, certificate requests, or
certificates. This includes TLS clients and TLS servers
with client authentication enabled. (CVE-2015-1788)

- A privilege escalation vulnerability exists due to an
untrusted search path flaw. A local attacker can exploit
this, via a specially crafted library that is loaded by
a setuid or setgid process, to gain elevated privileges
on the system. (CVE-2015-1947)

- A security feature bypass vulnerability exists, known as
Bar Mitzvah, due to improper combination of state data
with key data by the RC4 cipher algorithm during the
initialization phase. A man-in-the-middle attacker can
exploit this, via a brute-force attack using LSB values,
to decrypt the traffic. (CVE-2015-2808)

- A man-in-the-middle vulnerability, known as Logjam,
exists due to a flaw in the SSL/TLS protocol. A remote
attacker can exploit this flaw to downgrade connections
using ephemeral Diffie-Hellman key exchange to 512-bit
export-grade cryptography. (CVE-2015-4000)

Note that several of these vulnerabilities are due to the bundled
GSKit component and the embedded FCM 4.1 libraries.

See also :

http://www.ibm.com/support/docview.wss?uid=swg21647054#7
http://www.ibm.com/support/docview.wss?uid=swg1IT07394
http://www.ibm.com/support/docview.wss?uid=swg1IT08753
http://www.ibm.com/support/docview.wss?uid=swg1IT09900
http://www.ibm.com/support/docview.wss?uid=swg1IT09964
http://www.ibm.com/support/docview.wss?uid=swg1IT09969
http://www.nessus.org/u?4bbf45ac
https://www.smacktls.com/#freak
https://weakdh.org/

Solution :

Apply IBM DB2 version 10.5 Fix Pack 7 or later.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 5.9
(CVSS2#E:F/RL:TF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 87765 ()

Bugtraq ID: 71936
73684
74733
75158
79693

CVE ID: CVE-2015-0204
CVE-2015-1788
CVE-2015-1947
CVE-2015-2808
CVE-2015-4000

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now