what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

_SRT2003-11-06-0710.txt

_SRT2003-11-06-0710.txt
Posted Nov 8, 2003
Authored by Kevin Finisterre | Site secnetops.com

Secure Network Operations Advisory SRT2003-11-06-0710 - IBM DB2 UDB v7 through v8.1 contains multiple local security flaws including buffer overflows and format string bugs in db2start, db2stop, and db2govd. Fix available here.

tags | advisory, overflow, local
SHA-256 | 024592d4a5147b75bed2225d6e629852eb1d72976b68b04a810ce561e313c67c

_SRT2003-11-06-0710.txt

Change Mirror Download
Secure Network Operations, Inc.             http://www.secnetops.com/research
Strategic Reconnaissance Team research@secnetops.com
Team Lead Contact kf@secnetops.com


Our Mission:
************************************************************************
Secure Network Operations offers expertise in Networking, Intrusion
Detection Systems (IDS), Software Security Validation, and
Corporate/Private Network Security. Our mission is to facilitate a
secure and reliable Internet and inter-enterprise communications
infrastructure through the products and services we offer.

To learn more about our company, products and services or to request a
demo of ANVIL FCS please visit our site at http://www.secnetops.com, or
call us at: 978-263-3829


Quick Summary:
************************************************************************
Advisory Number : SRT2003-11-06-0710
Product : IBM DB2 UDB v8.1
Version : versions v7 and v8
Vendor : http://www-3.ibm.com/software/data/db2/
Class : Local
Criticality : High
Operating System(s) : *nix


Notice
************************************************************************
The full technical details of this vulnerability can be found at:
http://www.secnetops.com under the research section.


Basic Explanation
************************************************************************
High Level Description : DB2 contains multiple local security issues.
What to do : Apply v7fp11 (late November) and v8fp4.


Basic Technical Details
************************************************************************
Proof Of Concept Status : SNO has not yet created proof of concept.

Low Level Description : DB2 UDB version 8.1 for Linux and Unix contains
several local buffer overflows and format strings conditions. Our tests were
performed against DB2 on linux as installed from 009_ESE_LNX_32_NLV.tar.
Other unix variants may be affected in a similar manor.

Depending on the options selected the DB2 installer *may* ask you to add
several users to your machine. You are instructed to either add a new user
or choose an existing username. These are the users I added for testing:

dasusr:x:501:501::/home/dasusr:/bin/bash
db2inst1:x:502:502::/home/db2inst1:/bin/bash
db2fenc1:x:503:503::/home/db2fenc1:/bin/bash

The above usernames *may* be used in several setuid applications included
with DB2. The conditions we found are associated with the Instance user
db2inst1.

The following binaries contain multiple security issues in the form of both
format strings issues and buffer overflows.

-r-sr-s--x 1 root db2inst1 38044 Oct 11 07:26 db2start
-r-sr-s--x 1 root db2inst1 84713 Oct 11 07:26 db2stop
-r-sr-s--x 1 db2inst1 db2inst1 141857 Oct 11 07:26 db2govd

Full details on the overflows and format strings conditions can be located
at http://www.secnetops.com/research/advisories/SRT2003-11-06-0710.txt

Workaround: chmod -s the above mentioned binaries or use vendor patches.

Vendor Status : IBM has promptly attended to the issues at hand
Fixpak 4 for v8 is available now at http://www-3.ibm.com/cgi-bin/db2www
/data/db2/udb/winos2unix/support/download.d2w/report (wordwrapped). Fixpak
11 for v7 should be ready late november and will contain the equivalent fixes.


Bugtraq URL : To be assigned.
Disclaimer
----------------------------------------------------------------------
This advisory was released by Secure Network Operations,Inc. as a matter
of notification to help administrators protect their networks against
the described vulnerability. Exploit source code is no longer released
in our advisories but can be obtained under contract.. Contact our sales
department at sales@secnetops.com for further information on how to
obtain proof of concept code.


----------------------------------------------------------------------
Secure Network Operations, Inc. || http://www.secnetops.com
"Embracing the future of technology, protecting you."



Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close