Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Database

    DB2 Security Dinged Again

    By
    Lisa Vaas
    -
    October 2, 2003
    Share
    Facebook
    Twitter
    Linkedin

      IBMs DB2 UDB enterprise relational database has two more holes, adding up to a total of six reported within the past three weeks.

      The two most recent security vulnerabilities were reported on Thursday by security firm PenTest Ltd.

      The first is a stack-based overflow vulnerability found in DB2s Invoke command. Normally, the Invoke command triggers a procedure stored at a databases location. This command is also called the DARI (Database Application Remote Interface); it executes from the databases location and returns data to a client application.

      The stack-based overflow allows an intruder with database “Connect” privileges to execute arbitrary code on vulnerable servers in the context of Windows NTs Administrators group. This flaw is exploitable both by remote and local intruders, making its repair a high priority.

      But its scope is limited. The hole is restricted to DB2 Version 7.2 for Windows. IBM issued a statement saying that the problem “is limited to Windows-specific code in Version 7 that was replaced in Version 8. So, the vulnerability does not affect any of the Unix or Linux versions, nor does it affect Version 8.”

      IBMs FixPak 10a will take care of the problem. Download it here.

      The second vulnerability is yet another stack-based overflow. This one goes after DB2s Load command, which moves data from files, named pipes or devices into a DB2 table. An attacker with database “Connect” privileges can execute arbitrary code on vulnerable servers, by default in the context of the Windows Administrators group on Windows and typically db2as or db2inst1 on Linux.

      Again, this vulnerability is exploitable locally or remotely. At risk are DB2 UDB Version 7.2 for Linux/x86 and DB2 UDB Version 7.2 for Windows. According to PenTest, IBM has stated that Version 8.1 is also vulnerable. PenTest reported that other DB2 versions and target platforms werent available for testing but may be vulnerable as well.

      IBM said in a statement that “The problem was in common code and therefore affected all platforms and both Version 7 and Version 8 (though not all of those would have been exploitable).”

      The problem can be cleaned up in DB2 7.2 with FixPak 10/10a and in DB2 8.1 with FixPak 2, available here.

      These two DB2 vulnerabilities come on top of two somewhat minor ones found by Application Security Inc. on Monday and two major ones found by Core Security Technologies Inc. last month.

      According to Mark Rowe—an IT security consultant at PenTest, which is the Manchester, England, company that found the latest DB2 glitches—the problems were first reported to IBM in November 2002.

      While some security researchers believe that this apparent sluggishness in responding to security threats leaves enterprise databases open to sophisticated internal hacking, others such as Rowe believe that keeping vulnerabilities quiet helps to protect end users.

      “We follow a responsible disclosure policy,” he said. “We wont disclose any vulnerabilities until vendors have had time to fix them. Otherwise, you put the end user of the problems in a situation where theyd be vulnerable.”

      Discuss this in the eWEEK forum.

      Lisa Vaas
      Lisa Vaas is News Editor/Operations for eWEEK.com and also serves as editor of the Database topic center. Since 1995, she has also been a Webcast news show anchorperson and a reporter covering the IT industry. She has focused on customer relationship management technology, IT salaries and careers, effects of the H1-B visa on the technology workforce, wireless technology, security, and, most recently, databases and the technologies that touch upon them. Her articles have appeared in eWEEK's print edition, on eWEEK.com, and in the startup IT magazine PC Connection. Prior to becoming a journalist, Vaas experienced an array of eye-opening careers, including driving a cab in Boston, photographing cranky babies in shopping malls, selling cameras, typography and computer training. She stopped a hair short of finishing an M.A. in English at the University of Massachusetts in Boston. She earned a B.S. in Communications from Emerson College. She runs two open-mic reading series in Boston and currently keeps bees in her home in Mashpee, Mass.

      MOST POPULAR ARTICLES

      Big Data and Analytics

      Alteryx’s Suresh Vittal on the Democratization of...

      James Maguire - May 31, 2022 0
      I spoke with Suresh Vittal, Chief Product Officer at Alteryx, about the industry mega-shift toward making data analytics tools accessible to a company’s complete...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×