DB2 - Problem description
Problem IC62625 | Status: Closed |
SECURITY: Remote exploits of DB2 provided routines. | |
product: | |
DB2 FOR LUW / DB2FORLUW / 950 - DB2 | |
Problem description: | |
Remote exploitation of buffer overrun in DB2 provided table functions could allow an attacker to elevate privileges to that of the db2fmp process or cause the db2fmp process to trap. Trapping of the db2fmp process will not cause the DB2 server outages but will cause those FENCED, THREADSAFE routines also running in the db2fmp process to terminate. The remote exploitation will require the attacker to pass DB2 authentication. This problem was reported to IBM by an anonymous researcher working with TippingPoint's Zero Day Initiative (http://www.zerodayinitiative.com) | |
Problem Summary: | |
**************************************************************** * USERS AFFECTED: * * All DB2 systems on all Linux, Unix and Windows platforms at * * service levels from Version 9.5 GA through to Version 9.5 * * Fix Pack 4. * **************************************************************** * PROBLEM DESCRIPTION: * * See Error Description. * **************************************************************** * RECOMMENDATION: * * Upgrade to DB2 Version 9.5 Fix Pack 5 or see "Local Fix" * * portion for other suggestions. * **************************************************************** | |
Local Fix: | |
There is no workaround however revoking CONNECT privilege from PUBLIC will reduce the exposure. | |
available fix packs: | |
DB2 Version 9.5 Fix Pack 5 for Linux, UNIX, and Windows | |
Solution | |
The complete fix for this problem first appears in DB2 Version 9.5 Fix Pack 5 and all the subsequent Fix Packs. | |
Workaround | |
not known / see Local fix | |
Timestamps | |
Date - problem reported : Date - problem closed : Date - last modified : | 18.08.2009 15.12.2009 15.12.2009 |
Problem solved at the following versions (IBM BugInfos) | |
9.5.FP5 | |
Problem solved according to the fixlist(s) of the following version(s) | |
9.5.0.5 |