Multiple Arbitrary Command Execution Vulnerabilities
NGSSoftware Insight Security Research Advisory
Name: Multiple Arbitrary Command Execution Vulnerabilities
Systems Affected: All versions of Informix
Severity: High
Vendor URL: http://www.ibm.com/
Author: David Litchfield [ davidl@xxxxxxxxxxxxxxx ]
Date of Public Advisory: 2nd August 2006
Advisory number: #NISR02082006F
CVEID: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3860
Advisory URL: http://www.ngssoftware.com/research/
Description
***********
Informix Dynamic Server is a database developed by IBM. During a security
assessment of Informix multiple arbitrary command execution flaws were
found.
Details
*******
It is possible to inject arbitrary operating system commands into the SET
DEBUG FILE SQL statement and the start_onpload
and dbexp procedures. Any commands injected into SET DEBUG FILE will
execute with the privileges of the informix user; any command injected into
dbexp or start_onpload will execute with the privileges of the logged on
user.
Fix Information
***************
IBM was alerted to these flaws on the 6th January 2005. Patches have now
been made available.
NGSSQuirreL for Informix, an advanced vulnerability assessment scanner
designed specifically for Informix, can be used to accurately determine
whether your servers are vulnerable to this flaw. More information about
NGSSQuirreL for Informix can be found here
http://www.ngssoftware.com/products/database-security/ngs-squirrel-informix.php
About NGSSoftware
*****************
NGSSoftware develops vulnerability assessment and compliancy tools for
database servers including Oracle, Microsoft SQL Server, DB2, Sybase and
Informix. Headquartered in the United Kingdom NGS has offices in London, St.
Andrews (UK), Sydney, Brisbane, and Perth (Australia) and Texas in the
United States; NGSConsulting provide services to some of the largest and
most demanding organizations around the globe.
http://www.ngssoftware.com/
Telephone +44 208 401 0070
Fax +44 208 401 0076
enquiries@xxxxxxxxxxxxxxx