The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] IBM DB2 Remote DoS during CONNECT processing


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 20 Dec 2006 16:35:57 +0200
Subject: [UNIX] IBM DB2 Remote DoS during CONNECT processing
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20061220151050.1BE8E58AD@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  IBM DB2 Remote DoS during CONNECT processing
------------------------------------------------------------------------


SUMMARY

When connecting to a remote DB2 instance, the version 7 client typically 
sends a SQLJRA packet requesting start of the connection. If this SQLJRA 
packet is specially crafted, it can cause a DoS attack by crashing the DB2 
instance. Altering a few bytes at specific offsets in the packet exposes 
multiple NULL/invalid pointer dereference bugs in the server code. For 
example, on Windows, if 0x00 is used at any of these offsets, the 
sqle_db2ra_as_con_database function (from DB2ENGN.DLL) attempts to access 
NULL or invalid memory locations, causing an unhandled access violation 
(0xC0000005). This causes the DB2 instance to crash.

DETAILS

Vulnerable Systems:
 * All versions of IBM DB2 Database Server

A malicious CONNECT data stream sent to a DB2 server from V7 client may 
cause instance crash, resulting in a denial of service. Server crashes 
with the following stack trace back:
-------Frame------ ------Function + Offset------
0x2022DF24
sqle_db2ra_as_con_database__FP17sqle_db2ra_commonP10sqle_db2raP1
0sqler_glob + 0x268 0x2022D7CC
sqle_db2ra_as_con_driver__FP17sqle_db2ra_commonP10sqle_db2raP10s
qler_glob + 0x2A4 0xDA3AF114 sqledDb2raServerDriver + 0x129C
0xDB3FF900 sqljsDriveRequests__FP13sqle_agent_cbP11UCconHandle +
0x134 0xDB3FC480 sqljsDrdaAsInnerDriver__FP17sqlcc_init_structb
+ 0x2B4 0xDB3FBF60 sqljsDrdaAsDriver__FP17sqlcc_init_struct +
0x10C 0x200464EC sqleRunAgent__FPcUl + 0x578 0xD9598398
sqloCreateEDU__FPFPcUl_vPcUlP13SQLO_EDU_INFOPl + 0x304
0xD9597EF8 sqloSpawnEDU + 0x4CC

Fix:
To fix the problem apply the fixpak 13 for DB2 version 8.1 (same as 8.2 
FP6)  
<http://www-306.ibm.com/software/data/db2/udb/support/downloadv8.html>; 
http://www-306.ibm.com/software/data/db2/udb/support/downloadv8.html

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4257>; 
CVE-2006-4257


ADDITIONAL INFORMATION

The information has been provided by  <mailto:shatter@appsecinc.com.> Team 
SHATTER.
The original article can be found at:  
<http://www.appsecinc.com/resources/alerts/db2/2006-09-05.shtml>; 
http://www.appsecinc.com/resources/alerts/db2/2006-09-05.shtml




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру