Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Moderately critical

IBM DB2 UDB Multiple Vulnerabilities

-

Release Date:  2008-02-04    Last Update:  2008-10-13    Views:  11,624

Secunia Advisory SA28771

Where:

From remote

Impact:

Unknown, Security Bypass, Privilege escalation, DoS

Solution Status:

Vendor Patch

CVE Reference(s):

Description


Multiple vulnerabilities have been reported in IBM DB2 UDB, where some have unknown impacts, while others can be exploited by malicious, local users to gain escalated privileges, by malicious users to cause a DoS (Denial of Service) or to compromise a vulnerable system, and by malicious people to bypass certain security restrictions or to cause a DoS.

1) An error within the DB2PD tool when loading libraries can be exploited to execute arbitrary code with root privileges by setting the DB2INSTANCE environment variable.

2) An error within the Database Administration Server (DAS) can be exploited to cause a memory corruption by sending a specially crafted packet to default port 523/TCP.

3) A vulnerability within "SYSPROC.ADMIN_SP_C" can be exploited to compromise a vulnerable system.

For more information see vulnerability #2 in:
SA29022

4) An unspecified vulnerability when executing "ALTER TABLE" statements can be exploited to bypass certain access restrictions.

5) The DB2DART tool executes the "TPUT" command and allows a user to execute commands as the DB2 instance owner.

6) Unspecified errors exist in DB2WATCH, DB2FREEZE, and within several setuid binaries. No further information is available.

7) Unspecified errors within the processing of SQLJRA packets can be exploited to cause the DB2 instance to crash via a specially crafted SQLJRA packet.

8) A vulnerability in "SYSPROC.NNSTAT" can be exploited to manipulate certain data.

For more information see vulnerability #3 in:
SA29022

9) A vulnerability exists related to JAR file administration routines, which can be exploited to cause a DoS.

For more information see vulnerability #4 in:
SA29022

The vulnerabilities are reported in versions prior to 8.2 Fixpak 16.


Solution:
Apply Fixpak 16.

Further details available to Secunia VIM customers

Provided and/or discovered by:
1, 2) An anonymous researcher, reported via iDefense Labs.
7) Martin Rakhmanov, Cesar Cerrudo, and Esteban Martinez Fayo of Application Security Inc.
Reported by the vendor.

Original Advisory:
IBM:
http://www-1.ibm.com/support/docview.wss?uid=swg21294760
ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT

iDefense Labs:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=653
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=654

Application Security Inc.:
http://www.appsecinc.com/resources/alerts/db2/2008-01.shtml

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: IBM DB2 UDB Multiple Vulnerabilities

No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability