IBM DB2 Connect 9.7 < FP11 Special Build 36621 / 10.1 < FP6 Special Build 36610 / 10.5 < FP8 Special Build 36605 / 11.1.2 < FP2 Multiple Vulnerabilities (Windows)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote database server is affected by multiple vulnerabilities.

Description :

According to its version, the installation of IBM DB2 Connect on the
remote Windows host is either 9.7 prior to Fix Pack 11 Special Build
36621, 10.1 prior to Fix Pack 6 Special Build 36610, 10.5 prior to
Fix Pack 8 Special Build 36605, or 11.1.2 prior to Fix Pack 2. It is,
therefore, affected by the following vulnerabilities :

- A buffer overflow condition exists due to improper
validation of user-supplied input. A local attacker can
exploit this to overwrite DB2 files or cause a denial of
service condition. (CVE-2017-1105)

- A stack-based buffer overflow condition exists in the
Command Line Process (CLP) due to improper bounds
checking. A local attacker can exploit this to execute
arbitrary code. (CVE-2017-1297)

See also :

http://www-01.ibm.com/support/docview.wss?uid=swg22003877
http://www-01.ibm.com/support/docview.wss?uid=swg22004878

Solution :

Apply the appropriate IBM DB2 Connect Fix Pack or Special Build
based on the most recent fix pack level for your branch.

Risk factor :

Medium / CVSS Base Score : 4.6
(CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 3.6
(CVSS2#E:POC/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 101163 ()

Bugtraq ID: 99264
99271

CVE ID: CVE-2017-1105
CVE-2017-1297

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now