exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ptl-2003-01

ptl-2003-01
Posted Oct 1, 2003
Authored by Mark Rowe | Site pentest.co.uk

IBM DB2 versions 7.2 for Linux and Windows are both vulnerable to a stack overflow in the LOAD command that is both locally and remotely exploitable.

tags | advisory, overflow
systems | linux, windows
advisories | CVE-2003-0836
SHA-256 | c9695c6bff3ba24669ceadb74773cb61399b70ef6ad79da481b669121de0b01a

ptl-2003-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Pentest Limited Security Advisory

IBM DB2 LOAD Command Stack Overflow Vulnerability


Advisory Details
- ----------------

Title: IBM DB2 LOAD Command Stack Overflow Vulnerability
Announcement date: 1st October 2003
Advisory Reference: ptl-2003-01
CVE Name: CAN-2003-0836
Product: IBM DB2 Universal Database
Vulnerability Type : Buffer Overflow
Vendor-URL: http://www.ibm.com/software/data/db2/udb
Vendor-Status: Fixpack Issued
Remotely Exploitable: Yes
Locally Exploitable: Yes
Advisory URL: http://www.pentest.co.uk/


Vulnerability Description
- -------------------------

DB2 is IBM's relational database software. The IBM DB2 LOAD command,
moves data from files, named pipes, or devices into a DB2 table. This
command is vulnerable to a stack based overflow that allows an attacker
with "Connect" privileges to the database to execute arbitrary code on
the vulnerable machine, by default in the context of the Administrators
group on Windows and typically db2as or db2inst1 on Linux.

The vulnerability is triggered by issuing a carefully crafted LOAD
command.


Vulnerable Versions
- -------------------

IBM DB2 Universal Data Base v7.2 for Linux/x86 is vulnerable.
IBM DB2 Universal Data Base v7.2 for Windows is vulnerable.

According to the vendor IBM DB2 Universal Data Base v8.1 is also
vulnerable. Other IBM DB2 versions and target platforms were not
available for testing, but may be vulnerable as well.

The vendor stated that 'the problem was in common code and therefore
affected all platforms and both v7 and v8 (though not all of those would
have been exploitable).'

Vendor Status
- -------------

IBM:
- - Pentest Notification: 20-11-2002
- - Notification acknowledged by IBM: 22-11-2002
- - Fixes available from: 17-09-2003

Fix
- ---

Issue is fixed in Fixpak 10/10a for DB2 v7.2.
Issue is fixed in Fixpak 2 for DB2 v8.1.

Fixpaks are available at:

http://www-3.ibm.com/cgi-bin/db2www/data/db2/udb/winos2unix/support/download.d2w/report



Credit
- ------

This vulnerability was discovered by Mark Rowe from Pentest Limited.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/ezMy4bMUolR4sycRAtr+AKCORME58vRDwEf+b0dhtOzBOsiI9QCfZQUQ
NeGBSN0Df5qH5ynQHAnKpqI=
=p2HP
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close