Multiple vulnerabilities have been reported in IBM DB2 UDB, where some have unknown impacts, while others can be exploited by malicious, local users to gain escalated privileges, by malicious users to cause a DoS (Denial of Service) or to compromise a vulnerable system, and by malicious people to bypass certain security restrictions or to cause a DoS.
1) An error within the DB2PD tool when loading libraries can be exploited to execute arbitrary code with root privileges by setting the DB2INSTANCE environment variable.
2) An error within the Database Administration Server (DAS) can be exploited to cause a memory corruption by sending a specially crafted packet to default port 523/TCP.
3) A vulnerability within "SYSPROC.ADMIN_SP_C" can be exploited to compromise a vulnerable system.
For more information see vulnerability #2 in: SA29022
4) An unspecified vulnerability when executing "ALTER TABLE" statements can be exploited to bypass certain access restrictions.
5) The DB2DART tool executes the "TPUT" command and allows a user to execute commands as the DB2 instance owner.
6) Unspecified errors exist in DB2WATCH, DB2FREEZE, and within several setuid binaries. No further information is available.
7) Unspecified errors within the processing of SQLJRA packets can be exploited to cause the DB2 instance to crash via a specially crafted SQLJRA packet.
8) A vulnerability in "SYSPROC.NNSTAT" can be exploited to manipulate certain data.
For more information see vulnerability #3 in: SA29022
9) A vulnerability exists related to JAR file administration routines, which can be exploited to cause a DoS.
For more information see vulnerability #4 in: SA29022
The vulnerabilities are reported in versions prior to 8.2 Fixpak 16.
Provided and/or discovered by: 1, 2) An anonymous researcher, reported via iDefense Labs.
7) Martin Rakhmanov, Cesar Cerrudo, and Esteban Martinez Fayo of Application Security Inc.
Reported by the vendor.
Original Advisory: IBM:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: IBM DB2 UDB Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.