IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 allows local users to create arbitrary directories and execute arbitrary code via a "crafted localized message file" that enables a format string attack, possibly involving the (1) OSSEMEMDBG or (2) TRC_LOG_FILE environment variable in db2licd (db2licm).
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/36106 | vdb entry |
http://www-1.ibm.com/support/docview.wss?uid=swg21255607 | |
http://www.attrition.org/pipermail/vim/2007-August/001765.html | mailing list |
http://www.vupen.com/english/advisories/2007/2912 | vdb entry |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=581 | third party advisory |
http://www.securityfocus.com/bid/25339 | vdb entry |
http://www-1.ibm.com/support/docview.wss?uid=swg21255352 | |
http://securitytracker.com/id?1018581 | vdb entry |
http://secunia.com/advisories/26471 | third party advisory patch vendor advisory |
http://www-1.ibm.com/support/docview.wss?uid=swg1IY98101 | vendor advisory |
http://www-1.ibm.com/support/docview.wss?uid=swg1IY98011 | vendor advisory |