Check Point Advisories

IBM DB2 Universal Database XML Query Buffer Overflow (CVE-2008-3854)

Check Point Reference: CPAI-2008-345
Date Published: 16 Nov 2009
Severity: High
Last Updated: Monday 16 November, 2009
Source:
Industry Reference:CVE-2008-3854
Protection Provided by:

Security Gateway
R81, R80, R77, R75

Who is Vulnerable?
Vulnerability Description IBM DB2 Database is a relational database management system made available for Unix, Windows, and Linux platforms. The product consists of a set of services that work together to provide data processing functionalities. DB2 can be administrated from command-line tools or GUI tools. IBM DB2 runs various processes on windows platforms. There exists a stack buffer overflow vulnerability in IBM DB2 Universal Database application. The vulnerability is due to an insufficient boundary check on an argument passed to a certain function call. Remote authenticated attackers can exploit this vulnerability to overrun a stack buffer and execute arbitrary code with elevated privileges or cause denial of service on the server. In an attack case where code injection is not successful, the affected service may terminate upon processing of the malicious SQL statement. In a more sophisticated attack case, where code injection is successful, the behavior of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the service process, normally System.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the IBM DB2 Universal Database XML Query Buffer Overflow protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  IBM Protection Violation.
Attack Information:  IBM DB2 Universal Database XML query buffer overflow

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK