Advisory Details

February 7th, 2011

(0Day) IBM Informix Dynamic Server SET ENVIRONMENT Remote Code Execution Vulnerability

ZDI-11-050
ZDI-CAN-405

CVE ID CVE-2011-1033
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS IBM
AFFECTED PRODUCTS Informix
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['6553']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Informix Database Server. SQL query execution privileges are required to exploit this vulnerability.

The specific flaw exists within the oninit process bound to TCP port 9088 when processing the arguments to the USELASTCOMMITTED option in a SQL query. User-supplied data is copied into a stack-based buffer without proper bounds checking resulting in an exploitable overflow. Exploitation can result in arbitrary code execution under the context of the database server.

ADDITIONAL DETAILS

http://www-01.ibm.com/support/docview.wss?uid=swg1IC74666


DISCLOSURE TIMELINE
  • 2008-11-10 - Vulnerability reported to vendor
  • 2011-02-07 - Coordinated public release of advisory
CREDIT Anonymous
BACK TO ADVISORIES