Check Point Reference: | CPAI-2008-345 |
Date Published: | 16 Nov 2009 |
Severity: | High |
Last Updated: | Monday 16 November, 2009 |
Source: | |
Industry Reference: | CVE-2008-3854 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | IBM DB2 Database is a relational database management system made available for Unix, Windows, and Linux platforms. The product consists of a set of services that work together to provide data processing functionalities. DB2 can be administrated from command-line tools or GUI tools. IBM DB2 runs various processes on windows platforms. There exists a stack buffer overflow vulnerability in IBM DB2 Universal Database application. The vulnerability is due to an insufficient boundary check on an argument passed to a certain function call. Remote authenticated attackers can exploit this vulnerability to overrun a stack buffer and execute arbitrary code with elevated privileges or cause denial of service on the server. In an attack case where code injection is not successful, the affected service may terminate upon processing of the malicious SQL statement. In a more sophisticated attack case, where code injection is successful, the behavior of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the service process, normally System. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: IBM Protection Violation.
Attack Information: IBM DB2 Universal Database XML query buffer overflow