Advisory Details

October 10th, 2007

IBM DB2 DB2JDS Multiple Vulnerabilities

ZDI-07-056
ZDI-CAN-125

CVE ID CVE-2007-2582
CVSS SCORE
AFFECTED VENDORS IBM
AFFECTED PRODUCTS DB2 Universal Database
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['4870', '4876', '4877']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

The most severe of these vulnerabilities allows remote attackers to execute arbitrary code on vulnerable installations of IBM DB2 Universal Database. Authentication is not required to exploit these vulnerabilities.

The first flaw exists in the DB2JDS service listening on TCP port 6789. A specially crafted packet is improperly processed by an internal sprintf() call resulting in a stack overflow which can be leveraged to execute arbitrary code.

Additionally, two DoS condition vulnerabilities were discovered. The first flaw is an overflow resulting from an invalid LANG paramater. The second DoS can be triggered by sending a packet over 32768 bytes in length, resulting in a MemTree overflow which will cause the process to terminate.

ADDITIONAL DETAILS IBM has issued an update to correct this vulnerability. More details can be found at:
http://www-1.ibm.com/support/docview.wss?uid=swg1IY97750
DISCLOSURE TIMELINE
  • 2006-11-09 - Vulnerability reported to vendor
  • 2007-10-10 - Coordinated public release of advisory
CREDIT Anonymous
BACK TO ADVISORIES