The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] IBM DB2 Universal Database Multiple Privilege Escalation Vulnerabilities


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 26 Feb 2007 14:56:13 +0200
Subject: [UNIX] IBM DB2 Universal Database Multiple Privilege Escalation Vulnerabilities
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20070226143102.85A1A573A@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  IBM DB2 Universal Database Multiple Privilege Escalation Vulnerabilities
------------------------------------------------------------------------


SUMMARY

IBM Corp.'s  <http://ibm.com/db2/>; DB2 Universal Database product is a 
large database server product commonly used for higher end databases.

Local exploitation of a multiple vulnerabilities in IBM Corp.'s DB2 
Universal Database allow attackers to cause a denial of service condition 
or elevate privileges to root.

DETAILS

Vulnerable Systems:
 * IBM Corp.'s DB2 Universal Database 9.1 release installed on Linux.
 * Other versions, including those installed on other architectures, are 
suspected to be vulnerable as well.
 * These vulnerabilities do not appear to affect DB2 Universal Database 
running on the windows platform.

Several vulnerabilities exist due to unsafe file access from within 
several setuid-root binaries. Specifically, when supplying certain 
environment variables, the DB2 administration binaries will use the 
specified filename for saving data. This allows an attacker to create or 
append to arbitrary files as root.

A heap-based buffer overflow vulnerability can occur when copying data 
from an environment variable. The variable contents are copied to a static 
BSS segment buffer without ensuring proper NUL termination. Consequently, 
this allows an attacker to cause a heap overflow in a later function call.

A stack-based buffer overflow can occur when an environment variable 
contains a long string. By specifying a specially crafted value, it is 
possible to overwrite the return address of a function and execute 
arbitrary code.

Successful exploitation allows a local attacker to cause a denial of 
service condition or potentially gain root privileges.

In some cases, the attacker does not appear to have any control over the 
contents of the data written to disk. If this is true, then privilege 
escalation could only occur via another bug where the existence of 
specially crafted file name allows code execution. Denial of service is 
trivial by writing to /etc/nologin or corrupting other system files.

Workaround:
The best defense against these vulnerabilities is to prevent untrusted 
users from having code execution abilities on the respective database 
server. The following workarounds also have value.

Use a more strict permissions setting for the DB2 instance directory would 
prevent non-instance users from accessing the setuid-root binaries.

Remove the setuid bit from all programs included with DB2.

These configuration changes have not been tested and may cause adverse 
behavior.

Vendor Status:
IBM Corp. has addressed this vulnerability within IBM Universal Database 
DB2 9 Fixpack 2. For more information, consult the corresponding IBM APAR 
#IY94833 by visiting the following URL.
 <http://www-1.ibm.com/support/docview.wss?uid=swg21255747>; 
http://www-1.ibm.com/support/docview.wss?uid=swg21255747

Disclosure Timeline:
 * 11/15/2006 - Initial vendor notification
 * 01/29/2007 - Initial vendor response
 * 02/22/2007 - Coordinated public disclosure


ADDITIONAL INFORMATION

The information has been provided by iDefense.
The original article can be found at:
 
<http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=481>; 
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=481




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру