The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] IBM DB2 Universal Database DB2INSTANCE File Creation Vulnerability


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 26 Feb 2007 14:58:16 +0200
Subject: [UNIX] IBM DB2 Universal Database DB2INSTANCE File Creation Vulnerability
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20070226142556.CD02757A2@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  IBM DB2 Universal Database DB2INSTANCE File Creation Vulnerability
------------------------------------------------------------------------


SUMMARY

IBM Corp.'s  <http://ibm.com/db2/>; DB2 Universal Database product is a 
large database server product commonly used for higher end databases.

Local exploitation of a file creation vulnerability in IBM Corp.'s DB2 
Universal Database could allow attackers to elevate privileges to the 
superuser.

DETAILS

Vulnerable Systems:
 * IBM Corp.'s DB2 Universal Database 9.1 release installed on Linux.
 * Other versions are suspected to be vulnerable as well.
 * This vulnerability does not affect DB2 Universal Database running on 
the windows platform.

This vulnerability exists due to unsafe file access from within several 
setuid-root binaries. Specifically, when supplying the DB2INSTANCE 
environment variable, the setuid-root DB2 administration binaries will use 
the home directory of the specified user for loading configuration data. 
This allows attackers create or append to arbitrary files by creating a 
specific executing environment. Additionally, the user's umask settings 
will be honored allowing the creation of root-owned world-writable files.

Successful exploitation allows a local attacker to gain root privileges.

It should be noted that the attacker does not appear to have a great deal 
of control over the contents of the data written. However, this does not 
significantly impact exploitation.

Workaround:
The best defense against this type of vulnerability is to prevent 
untrusted users from having code execution abilities on the respective 
database server. The following workarounds also have value.

Use a more strict permissions setting for the DB2 instance directory would 
prevent non-instance users from accessing the setuid-root binaries.

Remove the setuid bit from all programs included with DB2.

These configuration changes have not been tested and may cause adverse 
behavior.

Vendor Status:
IBM Corp. has addressed this vulnerability within IBM Universal Database 
DB2 9 Fixpack 2. For more information, consult the corresponding IBM APAR 
#IY94817 by visiting the following URL.
 <http://www-1.ibm.com/support/docview.wss?uid=swg21255745>; 
http://www-1.ibm.com/support/docview.wss?uid=swg21255745

Disclosure Timeline:
 * 11/15/2006 - Initial vendor notification
 * 01/29/2007 - Initial vendor response
 * 02/22/2007 - Coordinated public disclosure


ADDITIONAL INFORMATION

The information has been provided by iDefense.
The original article can be found at:
 
<http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=480>; 
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=480




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру