Date: 16 March 2004
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2004.0209 -- NGSSoftware Insight Security Research Advisory
IBM DB2 Remote Command Execution Privilege Upgrade
16 March 2004
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: DB2 8.1 Enterprise Edition
Publisher: NGSSoftware
Operating System: Windows
Impact: Administrator Compromise
Access Required: Existing Account
- --------------------------BEGIN INCLUDED TEXT--------------------
NGSSoftware Insight Security Research Advisory
Name: IBM DB2 Remote Command Execution Privilege Upgrade
Systems Affected: DB2 8.1 Enterprise Edition on Windows
Severity: High/Low depending on environment
Vendor URL: http://www.ibm.com/
Author: David Litchfield [ david@ngssoftware.com ]
Date Vendor Notified: 6th September 2003
Date of Public Advisory: 9th March 2004
Advisory number: #NISR09032004
Advisory URL: http://www.ngssoftware.com/advisories/db2rmtcmd.txt
Description
***********
IBM's DB2 is the market share leader for database server software. One of
the components, the Remote Command Server, contains a vulnerability that can
allow attackers to gain administrative privileges on the server running DB2.
Details
*******
DB2 with the Remote Command Server, DB2RCMD.EXE, listens on a named pipe
DB2REMOTECMD and executes commands sent through it. When a connection is
made to the pipe a new process is created, namely db2rcmdc.exe, and this
executes the command. Whilst a valid Windows user id and password are
required the command executes with the privileges of the "db2admin" account
which is an administrator.
This essentially means that even a low privileged "Guest" account can run
commands remotely with administrative privileges. This can lead to a
compromise of the server running DB2.
Fix Information
***************
IDM have included a fix for this problem in Fixpak 5 -
http://www-306.ibm.com/cgi-bin/db2www/data/db2/udb/winos2unix/support/v8fphist.d2w/report .
The APAR for this specific issue is IY53894 -
http://www-306.ibm.com/cgi-bin/db2www/data/db2/udb/winos2unix/support/aparlib.d2w/display_apar_details?aparno=IY53894 .
About NGSSoftware
*****************
NGSSoftware design, research and develop intelligent, advanced application
security assessment scanners. Based in the United Kingdom, NGSSoftware have
offices in the South of London and the East Coast of Scotland. NGSSoftware's
sister company NGSConsulting, offers best of breed security consulting
services, specialising in application, host and network security
assessments.
http://www.ngssoftware.com/
Telephone +44 208 401 0070
Fax +44 208 401 0076
enquiries@ngssoftware.com
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business
hours which are GMT+10:00 (AEST). On call after hours
for member emergencies only.
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBQFZECyh9+71yA2DNAQLYUAP/cbPLG+ynnSoiNOtN6QaN8yqzKckURl4q
orimA700+6fd5JO6rSykK1LsG/8pfQqiWFYdzswSarVwLlGNBJLhXgWeEK6ZhwRZ
3qG5ygFeWwbBD9YMfKPqUpDNF8isbyTDv2WAYgbcArojkvHMQVVRVAJFrE5m2zAB
M3iNgisl0xw=
=L3qF
-----END PGP SIGNATURE-----
|