Vulnerabilities > CVE-2001-0051 - Unspecified vulnerability in IBM DB2 Universal Database 6.1

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
ibm
nessus
exploit available

Summary

IBM DB2 Universal Database version 6.1 creates an account with a default user name and password, which allows remote attackers to gain access to the database.

Vulnerable Configurations

Part Description Count
Application
Ibm
2

Exploit-Db

descriptionIBM DB2 Universal Database for Linux 6.1/Windows NT 6.1 Known Default Password Vulnerability. CVE-2001-0051. Remote exploits for multiple platform
idEDB-ID:20472
last seen2016-02-02
modified2000-12-05
published2000-12-05
reporterbenjurry
sourcehttps://www.exploit-db.com/download/20472/
titleIBM DB2 - Universal Database for Linux 6.1/Windows NT 6.1 Known Default Password Vulnerability

Nessus

  • NASL familyDefault Unix Accounts
    NASL idACCOUNT_DB2INST1_DB2INST1.NASL
    descriptionThe account
    last seen2020-06-01
    modified2020-06-02
    plugin id11862
    published2003-10-01
    reporterThis script is Copyright (C) 2003-2018 Chris Foster
    sourcehttps://www.tenable.com/plugins/nessus/11862
    titleDefault Password (db2inst) for 'db2inst1' Account
    code
    #
    # This script was written by Chris Foster
    #
    #
    # See the Nessus Scripts License for details
    #
    # Changes by Tenable
    # Add global_settings/supplied_logins_only script_exclude_key (06/2015)
    # Add exit() messages for more detailed audits
    #
    
    account = "db2inst1";
    password = "db2inst1";
    
    
    include("compat.inc");
    
    if (description)
    {
      script_id(11862);
      script_version ("1.26");
      script_cvs_date("Date: 2018/08/09 17:06:37");
    
      script_cve_id("CVE-1999-0502", "CVE-2001-0051");
    
      script_name(english:"Default Password (db2inst) for 'db2inst1' Account");
      script_summary(english:"Attempts to log in to the remote host.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote host has an account with a default password set.");
      script_set_attribute(attribute:"description", value:
    "The account 'db2inst1' has the password 'db2inst1'. An attacker may
    use this to gain further privileges on this system.");
      script_set_attribute(attribute:"solution", value:
    "Set a strong password for this account or disable it if possible.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'SSH User Code Execution');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
    
      script_set_attribute(attribute:"plugin_publication_date", value:"2003/10/01");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"default_account", value:"true");
      script_set_attribute(attribute:"vuln_publication_date", value:"2000/12/05");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Default Unix Accounts");
    
      script_copyright(english:"This script is Copyright (C) 2003-2018 Chris Foster");
     
      script_dependencies("find_service1.nasl", "ssh_detect.nasl", "account_check.nasl");
      script_require_ports("Services/telnet", 23, "Services/ssh", 22);
      script_exclude_keys("global_settings/supplied_logins_only");
    
      exit(0);
    }
    
    #
    # The script code starts here : 
    #
    include("audit.inc");
    include("default_account.inc");
    include("global_settings.inc");
    
    if (supplied_logins_only) exit(0, "Nessus is currently configured to not log in with user accounts not specified in the scan policy.");
    
    if (! thorough_tests && ! get_kb_item("Settings/test_all_accounts"))
     exit(0, "Neither thorough_tests nor 'Settings/test_all_accounts' is set.");
    
    affected = FALSE;
    ssh_ports = get_service_port_list(svc: "ssh", default:22);
    foreach port (ssh_ports)
    {
      port = check_account(login:account, password:password, port:port, svc:"ssh");
      if (port)
      {
        affected = TRUE;
        security_report_v4(port:port, severity:SECURITY_HOLE, extra:default_account_report());
      }
    }
    if(affected) exit(0);
    
    telnet_ports = get_service_port_list(svc: "telnet", default:23);
    foreach port (telnet_ports)
    {
      port = check_account(login:account, password:password, port:port, svc:"telnet");
      if (port)
      {
        affected = TRUE;
        security_report_v4(port:port, severity:SECURITY_HOLE, extra:default_account_report());
      }
    }
    if(!affected) audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyDefault Unix Accounts
    NASL idACCOUNT_DB2AS_IBMDB2.NASL
    descriptionThe account
    last seen2020-06-01
    modified2020-06-02
    plugin id11863
    published2003-10-01
    reporterThis script is Copyright (C) 2003-2018 Chris Foster.
    sourcehttps://www.tenable.com/plugins/nessus/11863
    titleDefault Password (ibmdb2) for 'db2as' Account
    code
    #
    # This script was written by Chris Foster
    #
    #
    # See the Nessus Scripts License for details
    #
    # Changes by Tenable
    # Add global_settings/supplied_logins_only script_exclude_key (06/2015)
    # Add exit() messages for more detailed audits
    #
    
    account = "db2as";
    password = "ibmdb2";
    
    include("compat.inc");
    
    if (description)
    {
      script_id(11863);
      script_version ("1.33");
      script_cvs_date("Date: 2018/07/25 16:19:22");
    
      script_cve_id("CVE-1999-0502", "CVE-2001-0051");
      script_bugtraq_id(2068);
    
      script_name(english:"Default Password (ibmdb2) for 'db2as' Account");
      script_summary(english:"Attempts to log in to the remote host.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote host has an account with a default password.");
      script_set_attribute(attribute:"description", value:
    "The account 'db2as' has the password 'ibmdb2'. An attacker may use it
    to gain further privileges on the system.");
      script_set_attribute(attribute:"solution", value:
    "Set a strong password for this account or disable it if possible.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:TF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:T/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_set_attribute(attribute:"metasploit_name", value:'SSH User Code Execution');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2000/12/05");
      script_set_attribute(attribute:"plugin_publication_date", value:"2003/10/01");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"default_account", value:"true");
      script_end_attributes();
    
      script_copyright(english:"This script is Copyright (C) 2003-2018 Chris Foster.");
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Default Unix Accounts");
     
      script_dependencies("find_service1.nasl", "ssh_detect.nasl", "account_check.nasl");
      script_require_ports("Services/telnet", 23, "Services/ssh", 22);
      script_exclude_keys("global_settings/supplied_logins_only");
    
      exit(0);
    }
    
    #
    # The script code starts here : 
    #
    include("audit.inc");
    include("default_account.inc");
    include("global_settings.inc");
    
    if (supplied_logins_only) exit(0, "Nessus is currently configured to not log in with user accounts not specified in the scan policy.");
    
    if (! thorough_tests && ! get_kb_item("Settings/test_all_accounts"))
     exit(0, "Neither thorough_tests nor 'Settings/test_all_accounts' is set.");
    
    affected = FALSE;
    ssh_ports = get_service_port_list(svc: "ssh", default:22);
    foreach port (ssh_ports)
    {
      port = check_account(login:account, password:password, port:port, svc:"ssh");
      if (port)
      {
        affected = TRUE;
        security_report_v4(port:port, severity:SECURITY_HOLE, extra:default_account_report());
      }
    }
    if(affected) exit(0);
    
    telnet_ports = get_service_port_list(svc: "telnet", default:23);
    foreach port (telnet_ports)
    {
      port = check_account(login:account, password:password, port:port, svc:"telnet");
      if (port)
      {
        affected = TRUE;
        security_report_v4(port:port, severity:SECURITY_HOLE, extra:default_account_report());
      }
    }
    if(!affected) audit(AUDIT_HOST_NOT, "affected");
    
    
    
  • NASL familyDefault Unix Accounts
    NASL idACCOUNT_DB2INST1_IBMDB2.NASL
    descriptionThe account
    last seen2020-06-01
    modified2020-06-02
    plugin id11859
    published2003-10-01
    reporterThis script is Copyright (C) 2003-2018 Chris Foster.
    sourcehttps://www.tenable.com/plugins/nessus/11859
    titleDefault Password (ibmdb2) for 'db2inst1' Account
  • NASL familyDatabases
    NASL idSMB_ACCOUNT_DB2ADMIN_DEFAULT_PASSWORD.NASL
    descriptionThe
    last seen2020-06-01
    modified2020-06-02
    plugin id33852
    published2008-08-08
    reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/33852
    titleDefault Password (db2admin) for 'db2admin' Account on Windows
  • NASL familyDefault Unix Accounts
    NASL idACCOUNT_DB2FENC1_DB2FENC1.NASL
    descriptionThe account
    last seen2020-06-01
    modified2020-06-02
    plugin id11860
    published2003-10-01
    reporterThis script is Copyright (C) 2003-2018 Chris Foster.
    sourcehttps://www.tenable.com/plugins/nessus/11860
    titleDefault Password (db2fenc1) for 'db2fenc1' Account
  • NASL familyDefault Unix Accounts
    NASL idACCOUNT_DB2AS_DB2AS.NASL
    descriptionThe account
    last seen2020-06-01
    modified2020-06-02
    plugin id11864
    published2003-10-01
    reporterThis script is Copyright (C) 2003-2018 Chris Foster.
    sourcehttps://www.tenable.com/plugins/nessus/11864
    titleDefault Password (db2as) for 'db2as' Account
  • NASL familyDefault Unix Accounts
    NASL idACCOUNT_DB2FENC1_IBMDB2.NASL
    descriptionThe account
    last seen2020-06-01
    modified2020-06-02
    plugin id11861
    published2003-10-01
    reporterThis script is Copyright (C) 2003-2018 Chris Foster.
    sourcehttps://www.tenable.com/plugins/nessus/11861
    titleDefault Password (ibmdb2) for 'db2fenc1' Account