DB2 UDB - Unauthenticated Buffer Overflow and DoS (BID 18428)
Background
Scope
Imperva’s
Findings
An attacker can send a specially crafted EXCSAT command
during the handshake process with the server, causing the server process to
crash. It seems that the command invokes a buffer overflow condition on the
server possibly allowing execution of arbitrary code on the
server.
Details
The first message used by a client when establishing a connection to the database is the EXCSAT message (message code 0x1041). This message includes an object called MGRLVLLS (code 0x2114) which in term contains a vector of 4 byte entries (two bytes for the manager code and two byte for the compatibility level). When the size of the MGRLVLLS message is large enough a buffer overflow condition is invoked.
If the client terminates the connection immediately after sending this message the server process is terminated.
Exploit
Create an EXCSAT message with a very long (>1Kbytes)
MGRLVLLS message. (see attached)
Tested Versions
Vulnerable
Not Vulnerable
Vendor’s Status
Vendor notified on Feb-8, 2006.
Vulnerability patched in UDB 8.x FixPak 12 on
Reported by vendor to Bugtraq on
Workaround
None
|
Amichai
Shulman | ||
|
(972)
3-6120133 x103 Office |
| |
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
