Lucene search

K
nessusThis script is Copyright (C) 2007-2022 and is owned by Tenable, Inc. or an Affiliate thereof.DB2_9FP4.NASL
HistoryNov 16, 2007 - 12:00 a.m.

IBM DB2 < 9 Fix Pack 4 Multiple Vulnerabilities

2007-11-1600:00:00
This script is Copyright (C) 2007-2022 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
35

According to its version, the installation of IBM DB2 running on the remote host is affected by one or more of the following issues :

  • The ‘db2dart’ tool executes the ‘tput’ command which effectively allows a malicious user to run commands as the DB2 instance owner (IZ03646).

  • ‘db2watch’ and ‘db2freeze’ have some unspecified vulnerability (IZ03655).

  • Incorrect permissions on ACLs for ‘DB2NODES.CFG’ (JR26989).

  • A local user may be able to gain root privileges using an unspecified vulnerability in several set-uid binaries (IZ07018).

  • A buffer overflow and invalid memory access vulnerability exists in the DAS server code (unknown).

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(28227);
  script_version("1.29");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id(
    "CVE-2007-3676",
    "CVE-2007-5652",
    "CVE-2007-5757",
    "CVE-2007-6045",
    "CVE-2007-6046",
    "CVE-2007-6047",
    "CVE-2007-6048",
    "CVE-2007-6049",
    "CVE-2007-6050",
    "CVE-2007-6051",
    "CVE-2007-6052",
    "CVE-2007-6053",
    "CVE-2008-0698"
  );
  script_bugtraq_id(26450, 27680, 27681);

  script_name(english:"IBM DB2 < 9 Fix Pack 4 Multiple Vulnerabilities");

  script_set_attribute(attribute:"synopsis", value:
"The remote database server is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"According to its version, the installation of IBM DB2 running on the
remote host is affected by one or more of the following issues :

  - The 'db2dart' tool executes the 'tput' command which
    effectively allows a malicious user to run commands 
    as the DB2 instance owner (IZ03646).

  - 'db2watch' and 'db2freeze' have some unspecified
    vulnerability (IZ03655).

  - Incorrect permissions on ACLs for 'DB2NODES.CFG'
    (JR26989).

  - A local user may be able to gain root privileges using
    an unspecified vulnerability in several set-uid
    binaries (IZ07018).

  - A buffer overflow and invalid memory access 
    vulnerability exists in the DAS server code (unknown).");
  # https://labs.idefense.com/verisign/intelligence/2009/vulnerabilities/display.php?id=653
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6734f378");
  # https://labs.idefense.com/verisign/intelligence/2009/vulnerabilities/display.php?id=654
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?8ba276a6");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2008/Feb/72");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2008/Feb/73");
  script_set_attribute(attribute:"see_also", value:"https://www-01.ibm.com/support/docview.wss?uid=swg21255607");
  script_set_attribute(attribute:"solution", value:
"Apply IBM DB2 version 9 Fix Pack 4 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(119, 264, 399);

  script_set_attribute(attribute:"plugin_publication_date", value:"2007/11/16");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:db2");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Databases");

  script_copyright(english:"This script is Copyright (C) 2007-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("db2_das_detect.nasl");
  script_require_ports("Services/db2das", 523);

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("db2_report_func.inc");

port = get_service(svc:'db2das', default:523, exit_on_fail:TRUE);

level = get_kb_item_or_exit("DB2/" + port + "/Level");
if (level !~ '^9\\.[01]\\.') exit(0, "The version of IBM DB2 listening on port "+port+" is not 9.0 or 9.1 and thus is not affected.");

platform = get_kb_item_or_exit("DB2/"+port+"/Platform");
platform_name = get_kb_item("DB2/"+port+"/Platform_Name");
if (isnull(platform_name))
{
  platform_name = platform;
  report_phrase = "platform " + platform;
}
else
  report_phrase = platform_name;

vuln = FALSE;
# Windows, x86 32-bit
if (platform == 5)
{
  fixed_level = '9.1.400.359';
  if (ver_compare(ver:level, fix:fixed_level) == -1)
    vuln = TRUE;
}
# Linux, x86 2.6 kernel 32-bit
else if (platform == 18)
{
  fixed_level = '9.1.0.4';
  if (ver_compare(ver:level, fix:fixed_level) == -1)
    vuln = TRUE;
}
else
{
  info =
    'Nessus does not support version checks against ' + report_phrase + '.\n' +
    'To help us better identify vulnerable versions, please send the platform\n' +
    'number along with details about the platform, including the operating system\n' +
    'version, CPU architecture, and DB2 version to [email protected].\n';
  exit(1, info);
}

if (vuln)
{
  report_db2(
      severity        : SECURITY_HOLE,
      port            : port,
      platform_name   : platform_name,
      installed_level : level,
      fixed_level     : fixed_level);
}
else exit(0, "IBM DB2 "+level+" on " + report_phrase + " is listening on port "+port+" and is not affected.");
VendorProductVersionCPE
ibmdb2cpe:/a:ibm:db2

References