Some vulnerabilities and a security issue have been reported in IBM DB2, some of which have unknown impacts, and the other can be exploited by malicious, local users to gain escalated privileges or perform certain actions with escalated privileges, or by malicious people to cause a DoS (Denial of Service).
1) Unspecified errors exist in DB2WATCH, DB2FREEZE, and within several setuid binaries. No further information is available.
2) The DB2DART tool executes the "TPUT" command and allows a user to execute commands as the DB2 instance owner.
3) Other errors in the "OPERATING SYSTEM SERVICES" component (e.g. incorrect permissions on ACLs for DB2NODES.CFG) have also been reported. No further information is available.
4) The problem is that the DB2LICD creates an insecure directory. No further information is available.
5) A error in vector aggregation can be exploited to cause DBMS to shutdown.
6) An error within the DB2PD tool when loading libraries can be exploited to execute arbitrary code with root privileges by setting the DB2INSTANCE environment variable.
7) An error within the Database Administration Server (DAS) can be exploited to cause a memory corruption by sending a specially crafted packet to default port 523/TCP.
8) A design error in DB2 can be exploited by malicious, local users to gain "root" privileges when SSL is setup in DB2. This problem does not apply to Windows systems.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: IBM DB2 Multiple Vulnerabilities and Security Issue
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.