IBM Informix Dynamic Server oninit.exe EXPLAIN Remote Code Execution VulnerabilityZDI-10-216: October 18th, 2010
TippingPoint™ IPS Customer ProtectionTippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 10494. For further product information on the TippingPoint IPS:
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of IBM Informix Dynamic Server. Authentication is required in that an attacker must have valid credentials to connect to the database.
The specific flaw exists within the oninit.exe process bound by default to TCP port 9088 or 1526. A lack of sanity checking within a logging function can result in a stack based buffer overflow leading to arbitrary code execution under the context of the SYSTEM user.
Vendor ResponseIBM states:
this issue is fixed in version by defect #
idsdb00154243 - 11.50.xC1
idsdb00154125 - 11.10.xC2W2
2008-02-07 - Vulnerability reported to vendor
2010-10-18 - Coordinated public release of advisory
CreditThis vulnerability was discovered by: