IBM DB2 DB2JDS Multiple VulnerabilitiesZDI-07-056: October 10th, 2007
DB2 Universal Database
TippingPoint™ IPS Customer ProtectionTippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 4870,4876,4877. For further product information on the TippingPoint IPS:
The most severe of these vulnerabilities allows remote attackers to execute arbitrary code on vulnerable installations of IBM DB2 Universal Database. Authentication is not required to exploit these vulnerabilities.
The first flaw exists in the DB2JDS service listening on TCP port 6789. A specially crafted packet is improperly processed by an internal sprintf() call resulting in a stack overflow which can be leveraged to execute arbitrary code.
Additionally, two DoS condition vulnerabilities were discovered. The first flaw is an overflow resulting from an invalid LANG paramater. The second DoS can be triggered by sending a packet over 32768 bytes in length, resulting in a MemTree overflow which will cause the process to terminate.
Vendor ResponseIBM has issued an update to correct this vulnerability. More details can be found at:
2006-11-09 - Vulnerability reported to vendor
2007-10-10 - Coordinated public release of advisory
CreditThis vulnerability was discovered by: