Check Point Reference: | CPAI-2008-266 |
Date Published: | 17 Dec 2009 |
Severity: | Critical |
Last Updated: | Tuesday 10 November, 2015 |
Source: | |
Industry Reference: | CVE-2008-0727 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Informix is a family of relational database management system (RDBMS) products by IBM. It is positioned as IBM's flagship data server for online transaction processing (OLTP) as well as integrated solutions. IBM Informix Dynamic Server is an online transaction processing data server. A stack buffer overflow vulnerability exists in IBM Informix Dynamic Server. The vulnerability is due to a boundary error when processing a large number of arguments passed in the authentication messages. Remote unauthenticated attackers may exploit this vulnerability to cause a denial of service or to inject and execute arbitrary code on the target system with System privileges. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected service, normally System. In an attack case where code injection is not successful, the affected server will terminate and reset all established connections. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Database Protection Violation.
Attack Information: IBM Informix Dynamic Server command argument processing stack overflow