Lucene search

K
nessusThis script is Copyright (C) 2012-2022 and is owned by Tenable, Inc. or an Affiliate thereof.DB2_101FP1.NASL
HistorySep 28, 2012 - 12:00 a.m.

IBM DB2 10.1 < Fix Pack 1 Multiple Vulnerabilities

2012-09-2800:00:00
This script is Copyright (C) 2012-2022 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
28

According to its version, the installation of DB2 10.1 running on the remote host is affected by one or more of the following issues :

  • An error exists in the stored procedure ‘SQLJ.DB2_INSTALL_JAR’ that can allow unauthorized replacement of Jar files. Note this vulnerability only affects the Windows platform. (#IC84716 / CVE-2012-2194)

  • An error exists in the stored procedures ‘GET_WRAP_CFG_C’ and ‘GET_WRAP_CFG_C2’ that can allow unauthorized reading of XML files.
    (#IC84751 / CVE-2012-2196)

  • A stack-based buffer overflow exists in the Java stored procedure infrastructure.
    (#IC84755 / CVE-2012-2197)

  • An error exists in the ‘UTL_FILE’ module that can allow read, write and delete access to files outside the intended directory. Note this vulnerability only affects the Windows platform. (#IC85513 / CVE-2012-3324)

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(62369);
  script_version("1.17");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id(
    "CVE-2012-2194",
    "CVE-2012-2196",
    "CVE-2012-2197",
    "CVE-2012-3324"
  );
  script_bugtraq_id(54487, 55720);

  script_name(english:"IBM DB2 10.1 < Fix Pack 1 Multiple Vulnerabilities");

  script_set_attribute(attribute:"synopsis", value:
"The remote database server is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"According to its version, the installation of DB2 10.1 running on the
remote host is affected by one or more of the following issues :

  - An error exists in the stored procedure
    'SQLJ.DB2_INSTALL_JAR' that can allow unauthorized
    replacement of Jar files. Note this vulnerability only
    affects the Windows platform. (#IC84716 / CVE-2012-2194)

  - An error exists in the stored procedures
    'GET_WRAP_CFG_C' and 'GET_WRAP_CFG_C2' that can allow
    unauthorized reading of XML files.
    (#IC84751 / CVE-2012-2196)

  - A stack-based buffer overflow exists in the Java
    stored procedure infrastructure.
    (#IC84755 / CVE-2012-2197)

  - An error exists in the 'UTL_FILE' module that can allow
    read, write and delete access to files outside the
    intended directory. Note this vulnerability only
    affects the Windows platform. (#IC85513 / CVE-2012-3324)");
  script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/524334/30/0/threaded");
  script_set_attribute(attribute:"see_also", value:"https://www-01.ibm.com/support/docview.wss?uid=swg1IC84716");
  script_set_attribute(attribute:"see_also", value:"https://www-01.ibm.com/support/docview.wss?uid=swg1IC84751");
  script_set_attribute(attribute:"see_also", value:"https://www-01.ibm.com/support/docview.wss?uid=swg1IC84755");
  script_set_attribute(attribute:"see_also", value:"https://www-01.ibm.com/support/docview.wss?uid=swg1IC85513");
  script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg24033451");
  script_set_attribute(attribute:"solution", value:
"Apply IBM DB2 version 10.1 Fix Pack 1 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2012-3324");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2012/07/13");
  script_set_attribute(attribute:"patch_publication_date", value:"2012/09/14");
  script_set_attribute(attribute:"plugin_publication_date", value:"2012/09/28");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:db2");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Databases");

  script_copyright(english:"This script is Copyright (C) 2012-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("db2_das_detect.nasl");
  script_require_ports("Services/db2das", 523);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("db2_report_func.inc");

port = get_service(svc:"db2das", default:523, exit_on_fail:TRUE);

level = get_kb_item_or_exit("DB2/" + port + "/Level");
if (level !~ '^10\\.1\\.')  exit(0, "The version of IBM DB2 listening on port "+port+" is not 10.1.");

platform = get_kb_item_or_exit("DB2/"+port+"/Platform");
platform_name = get_kb_item("DB2/"+port+"/Platform_Name");
if (isnull(platform_name))
{
  platform_name = platform;
  report_phrase = "platform " + platform;
}
else
  report_phrase = platform_name;

report = "";
vuln = FALSE;

# Windows 32-bit/64-bit
if (platform == 5 || platform == 23)
{
  fixed_level = '10.1.100.145';
  if (ver_compare(ver:level, fix:fixed_level) == -1)
    vuln = TRUE;
}
# Others
else if (
  # Linux, 2.6 kernel 32/64-bit
  platform == 18 ||
  platform == 30 ||
  # AIX
  platform == 20
)
{
  fixed_level = '10.1.0.1';
  if (ver_compare(ver:level, fix:fixed_level) == -1)
    vuln = TRUE;
}
else
{
  info =
    'Nessus does not support version checks against ' + report_phrase + '.\n' +
    'To help us better identify vulnerable versions, please send the platform\n' +
    'number along with details about the platform, including the operating system\n' +
    'version, CPU architecture, and DB2 version to [email protected].\n';
  exit(1, info);
}

if (vuln)
{
  report_db2(
      severity        : SECURITY_HOLE,
      port            : port,
      platform_name   : platform_name,
      installed_level : level,
      fixed_level     : fixed_level);

}
else audit(AUDIT_LISTEN_NOT_VULN, "DB2", port, level);
VendorProductVersionCPE
ibmdb2cpe:/a:ibm:db2