RSS

Category: IBM DB2

Advisory: IBM DB2 JAR file overwrite vulnerability via SQLJ.DB2_INSTALL_JARTeam Shatter Exclusive

Posted October 4, 2012 by Alex Rothacker in IBM DB2, Security Advisory, Team Shatter Exclusive with 0 comments

JAR file overwrite vulnerability via SQLJ.DB2_INSTALL_JAR system stored procedure. Risk Level: High Affected versions: IBM DB2 LUW 9.1, 9.5, 9.7, 10.1 Remote exploitable: Yes Credits: This vulnerability was discovered and researched by Martin Rakhmanov of Application Security Inc. Details: System stored procedure SQLJ.DB2_INSTALL_JAR executable by PUBLIC allows JAR file overwrite to any authenticated user. Impact: Authenticated database users can replace JAR files and gain remote code execution. Vendor Status: Vendor was contacted and a patch was released. Workaround: Revoke EXECUTE…

Click for complete article >>

Advisory: IBM DB2 XML file disclosure vulnerability via GET_WRAP_CFG_C and GET_WRAP_CFG_C2Team Shatter Exclusive

Posted October 4, 2012 by Alex Rothacker in IBM DB2, Security Advisory, Team Shatter Exclusive with 0 comments

Risk Level: Medium Affected versions: IBM DB2 LUW 9.1, 9.5, 9.7, 10.1 Remote exploitable: Yes Credits: This vulnerability was discovered and researched by Martin Rakhmanov of Application Security Inc. Details: Two system stored procedures executable by PUBLIC allow reading files with xml extension on the server. To exploit this vulnerability the xml file should be readable by the DB2 fenced user. Impact: Authenticated database users can read xml files accessible to the DB2 fenced process. Vendor Status: Vendor was contacted…

Click for complete article >>

Remote DoS during CONNECT processing

Posted September 1, 2006 by egonzales in Database Security, Database Vendor, IBM DB2, IBM DB2, Security Advisory, Topics with 0 comments

Remote DoS during CONNECT processing Sept 1, 2006 Risk Level: Medium Affected versions: All versions of IBM DB2 Database Server Credits: This vulnerability was discovered and researched by Vivek Rathod of Application Security, Inc. Details: When connecting to a remote DB2 instance, the version 7 client typically sends a SQLJRA packet requesting start of the connection. If this SQLJRA packet is specially crafted, it can cause a DoS attack by crashing the DB2 instance. Altering a few bytes at specific…

Click for complete article >>

Denial of Service Vulnerability in Discovery

Posted September 18, 2003 by egonzales in Database Security, Database Vendor, IBM DB2, IBM DB2, Security Advisory, Topics with 0 comments

Denial of Service Vulnerability in Discovery September 18, 2003 Risk level: Low Summary: IBM DB2 provides a UDP service used as a discovery service for locating DB2databases on the network. This UDP service shuts down when sent more than 20bytes. Details: IBM DB2 is a database that provides many services. One of these services is a discovery service. This is used to locate a service when configuring a connection. This service listens on UDP port 523. This service typically receives…

Click for complete article >>
Powered by