TippingPoint Zero Day Initiative

IBM DB2 DB2JDS Multiple Vulnerabilities

ZDI-07-056: October 10th, 2007


Affected Vendors

Affected Products

    DB2 Universal Database

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 4870,4876,4877. For further product information on the TippingPoint IPS:

Vulnerability Details

The most severe of these vulnerabilities allows remote attackers to execute arbitrary code on vulnerable installations of IBM DB2 Universal Database. Authentication is not required to exploit these vulnerabilities.

The first flaw exists in the DB2JDS service listening on TCP port 6789. A specially crafted packet is improperly processed by an internal sprintf() call resulting in a stack overflow which can be leveraged to execute arbitrary code.

Additionally, two DoS condition vulnerabilities were discovered. The first flaw is an overflow resulting from an invalid LANG paramater. The second DoS can be triggered by sending a packet over 32768 bytes in length, resulting in a MemTree overflow which will cause the process to terminate.

Vendor Response

IBM has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2006-11-09 - Vulnerability reported to vendor
    2007-10-10 - Coordinated public release of advisory


This vulnerability was discovered by: