| CVE-2008-0727 |
|
发布时间 :2008-03-17 20:44:00 | ||
| 修订时间 :2011-03-07 22:05:21 | ||||
| NMCOPS |
[原文]Multiple buffer overflows in oninit.exe in IBM Informix Dynamic Server (IDS) 7.x through 11.x allow (1) remote attackers to execute arbitrary code via a long password and (2) remote authenticated users to execute arbitrary code via a long DBPATH value.
[CNNVD]IBM Informix Dynamic Server多个远程溢出漏洞(CNNVD-200803-256)
IBM Informix Dynamic Server为企业提供运行业务所需的任务关键型数据基础设施。
(1)远程攻击者利用长密码执行任意代码(2)远程认证用户执行任意代码利用一个长的DBPATH值
–
CVSS (基础分值)
| CVSS分值: | 8.5 | [严重(HIGH)] |
| 机密性影响: | NONE | [对系统的机密性无影响] |
| 完整性影响: | COMPLETE | [系统完整性可被完全破坏] |
| 可用性影响: | COMPLETE | [可能导致系统完全宕机] |
| 攻击复杂度: | LOW | [漏洞利用没有访问限制 ] |
| 攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
| 身份认证: | SINGLE_INSTANCE | [–] |
–
CWE (弱点类目)
| CWE-119 | [内存缓冲区边界内操作的限制不恰当] |
–
CPE (受影响的平台与产品)
| cpe:/a:ibm:informix_dynamic_server:10.0.xc3 | IBM Informix IDS 10.0.xC3 |
| cpe:/a:ibm:informix_dynamic_server:11.10.xc2 | |
| cpe:/a:ibm:informix_dynamic_server:9.40.uc1 | IBM Informix IDS 9.40.UC1 |
| cpe:/a:ibm:informix_dynamic_server:9.40_xc7 | |
| cpe:/a:ibm:informix_dynamic_server:9.4 | IBM Informix IDS 9.4 |
| cpe:/a:ibm:informix_dynamic_server:10.0.xc4 | |
| cpe:/a:ibm:informix_dynamic_server:7.31.xd9 | |
| cpe:/a:ibm:informix_dynamic_server:10.00.xc7w1 | |
| cpe:/a:ibm:informix_dynamic_server:7.31.xd8 | |
| cpe:/a:ibm:informix_dynamic_server:10.0 | IBM Informix Dynamic Server 10.0 |
| cpe:/a:ibm:informix_dynamic_server:7.3 | |
| cpe:/a:ibm:informix_dynamic_server:9.40.tc5 | IBM Informix IDS 9.40.TC5 |
| cpe:/a:ibm:informix_dynamic_server:9.40.uc2 | IBM Informix IDS 9.40.UC2 |
| cpe:/a:ibm:informix_dynamic_server:9.3 | |
| cpe:/a:ibm:informix_dynamic_server:9.40.uc3 | IBM Informix IDS 9.40.UC3 |
| cpe:/a:ibm:informix_dynamic_server:9.40.xd8 | |
| cpe:/a:ibm:informix_dynamic_server:9.40.uc5 | IBM Informix IDS 9.40.UC5 |
–
OVAL (用于检测的技术细节)
| 未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
–
漏洞信息
| IBM Informix Dynamic Server多个远程溢出漏洞 | |
| 高危 | 缓冲区溢出 |
| 2008-03-17 00:00:00 | 2008-09-05 00:00:00 |
| 远程 | |
| IBM Informix Dynamic Server为企业提供运行业务所需的任务关键型数据基础设施。
(1)远程攻击者利用长密码执行任意代码(2)远程认证用户执行任意代码利用一个长的DBPATH值 |
|
–
公告与补丁
–
漏洞信息 (F64554)
| Zero Day Initiative Advisory 08-012 (PacketStormID:F64554) |
2008-03-13 00:00:00 |
| Tipping Point zerodayinitiative.com |
advisory,remote,overflow,arbitrary,tcp,code execution |
CVE-2008-0727 |
[点击下载] |
|
A vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of IBM’s Informix Dynamic Server. User interaction is not required to exploit this vulnerability. Authentication is not required to exploit this vulnerability. The specific flaw exists in the oninit.exe process that listens by default on TCP port 1526. During authentication, the process does not validate the length of the supplied user password. An attacker can provide a overly long password and overflow a stack based buffer resulting in arbitrary code execution. |
ZDI-08-012: IBM Informix Dynamic Server Authentication Password Stack
Overflow Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-08-012
March 13, 2008
-- CVE ID:
CVE-2008-0727
-- Affected Vendors:
IBM
-- Affected Products:
IBM Informix
-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 5725.
For further product information on the TippingPoint IPS, visit:
http://www.tippingpoint.com
-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
systems with vulnerable installations of IBM's Informix Dynamic Server.
User interaction is not required to exploit this vulnerability.
Authentication is not required to exploit this vulnerability.
The specific flaw exists in the oninit.exe process that listens by
default on TCP port 1526. During authentication, the process does not
validate the length of the supplied user password. An attacker can
provide a overly long password and overflow a stack based buffer
resulting in arbitrary code execution.
-- Vendor Response:
IBM has issued an update to correct this vulnerability. More
details can be found at:
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55210
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55209
-- Disclosure Timeline:
2007-11-07 - Vulnerability reported to vendor
2008-03-13 - Coordinated public release of advisory
-- Credit:
This vulnerability was discovered by:
* Anonymous
-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.
Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:
http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.
Our vulnerability disclosure policy is available online at:
http://www.zerodayinitiative.com/advisories/disclosure_policy/
CONFIDENTIALITY NOTICE: This e-mail message, including any attachments,
is being sent by 3Com for the sole use of the intended recipient(s) and
may contain confidential, proprietary and/or privileged information.
Any unauthorized review, use, disclosure and/or distribution by any
recipient is prohibited. If you are not the intended recipient, please
delete and/or destroy all copies of this message regardless of form and
any included attachments and notify 3Com immediately by contacting the
sender via reply e-mail or forwarding to 3Com at [email protected].
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
–
漏洞信息 (F64553)
| Zero Day Initiative Advisory 08-011 (PacketStormID:F64553) |
2008-03-13 00:00:00 |
| Tipping Point zerodayinitiative.com |
advisory,remote,overflow,arbitrary,tcp,code execution |
CVE-2008-0727 |
[点击下载] |
|
A vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of IBM’s Informix Dynamic Server. User interaction is not required to exploit this vulnerability. Authentication is required in that an attacker must have database connection privileges. The specific flaw exists in the oninit.exe process that listens by default on TCP port 1526. During authentication, the process does not validate the length of the DBPATH variable. An attacker can provide a overly long variable name and overflow a global buffer, overwriting function pointers leading to arbitrary code execution. |
ZDI-08-011: IBM Informix Dynamic Server DBPATH Buffer Overflow
Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-08-011
March 13, 2008
-- CVE ID:
CVE-2008-0727
-- Affected Vendors:
IBM
-- Affected Products:
IBM Informix
-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 5723.
For further product information on the TippingPoint IPS, visit:
http://www.tippingpoint.com
-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
systems with vulnerable installations of IBM's Informix Dynamic Server.
User interaction is not required to exploit this vulnerability.
Authentication is required in that an attacker must have database
connection priviliges.
The specific flaw exists in the oninit.exe process that listens by
default on TCP port 1526. During authentication, the process does not
validate the length of the DBPATH variable. An attacker can provide a
overly long variable name and overflow a global buffer, overwriting
function pointers leading to arbitrary code execution.
-- Vendor Response:
IBM has issued an update to correct this vulnerability. More
details can be found at:
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55208
http://www-1.ibm.com/support/docview.wss?uid=swg1IC55207
-- Disclosure Timeline:
2007-11-07 - Vulnerability reported to vendor
2008-03-13 - Coordinated public release of advisory
-- Credit:
This vulnerability was discovered by:
* Anonymous
-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.
Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:
http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.
Our vulnerability disclosure policy is available online at:
http://www.zerodayinitiative.com/advisories/disclosure_policy/
CONFIDENTIALITY NOTICE: This e-mail message, including any attachments,
is being sent by 3Com for the sole use of the intended recipient(s) and
may contain confidential, proprietary and/or privileged information.
Any unauthorized review, use, disclosure and/or distribution by any
recipient is prohibited. If you are not the intended recipient, please
delete and/or destroy all copies of this message regardless of form and
any included attachments and notify 3Com immediately by contacting the
sender via reply e-mail or forwarding to 3Com at [email protected].
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
–
漏洞信息
42699 |
|
| IBM Informix Dynamic Server oninit.exe Process DBPATH Variable handling Remote Overflow | |
Remote / Network Access |
Input Manipulation |
| Loss of Integrity | |
| Exploit Private | |
–
漏洞描述
–
时间线
2008-03-11 |
Unknow |
| Unknow | Unknow |
–
解决方案
| Currently, there are no known workarounds or upgrades to correct this issue. However, IBM has released a patch to address this vulnerability. |
–
相关参考
|
漏洞作者
| Unknown or Incomplete |
–
漏洞信息
| IBM Informix Dynamic Server Multiple Remote Vulnerabilities | |
Unknown |
28198 |
| Yes | No |
| 2008-03-11 12:00:00 | 2008-04-18 12:28:00 |
The vendor credits MWR InfoSecurity and Zero Day Initiative with the discovery of these vulnerabilities. |
|
–
受影响的程序版本
| IBM Informix IDS 9.40 .UC3
IBM Informix IDS 9.40 .UC2 IBM Informix IDS 9.40 .UC1 IBM Informix IDS 9.3 IBM Informix IDS 9.40.xD8 IBM Informix IDS 9.40.UC5 IBM Informix IDS 9.40.TC5 IBM Informix IDS 9.40 IBM Informix IDS 9.4 IBM Informix IDS 7.31 .xD9 IBM Informix IDS 7.31 .xD8 IBM Informix IDS 7.3 IBM Informix IDS 11.10.xC2 IBM Informix IDS 11.10 IBM Informix IDS 10.00.xC8 IBM Informix IDS 10.00.xC7W1 IBM Informix IDS 10.0.xC4 IBM Informix IDS 10.0 xC3 IBM Informix IDS 10.0 |
–
漏洞讨论
| IBM Informix Dynamic Server is prone to multiple remote vulnerabilities:
– Two buffer-overflow vulnerabilities. An attacker can exploit these issues to execute arbitrary code with superuser privileges. Successfully exploiting these issues will result in the complete compromise of affected computers. Failed exploit attempts will cause denial-of-service conditions. |
–
漏洞利用
| Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]. |
–
解决方案
| The vendor released updates to address these issues. Please see the references for more information. |






![[八卦] 王婷婷—揭秘一个大三女生的性爱录像-微慑信息网-VulSee.com](http://free.86hy.com/crack/pic/1.jpg)
![[随笔]今天国际警察节-微慑信息网-VulSee.com](http://photo.sohu.com/20041017/Img222528326.jpg)

青云网
