DB2 Universal Database
|TREND MICRO CUSTOMER PROTECTION||Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 4870,4876,4877. For further product information on the TippingPoint IPS: http://www.tippingpoint.com|
The most severe of these vulnerabilities allows remote attackers to execute arbitrary code on vulnerable installations of IBM DB2 Universal Database. Authentication is not required to exploit these vulnerabilities.
The first flaw exists in the DB2JDS service listening on TCP port 6789. A specially crafted packet is improperly processed by an internal sprintf() call resulting in a stack overflow which can be leveraged to execute arbitrary code.
Additionally, two DoS condition vulnerabilities were discovered. The first flaw is an overflow resulting from an invalid LANG paramater. The second DoS can be triggered by sending a packet over 32768 bytes in length, resulting in a MemTree overflow which will cause the process to terminate.
IBM has issued an update to correct this vulnerability. More details can be found at: