SB2018052401 - Privilege escalation in IBM DB2
Published: May 24, 2018
Security Bulletin ID
SB2018052401
Severity
Low
Patch available
YES
Number of vulnerabilities
5
Exploitation vector
Local access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2018-1544)
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to buffer overflow in db2exmig and db2exfm. A local attacker can trigger memory corruption and escalate privileges to the DB2 instance owner to execute arbitrary code with root privileges.
The weakness exists due to buffer overflow in db2exmig and db2exfm. A local attacker can trigger memory corruption and escalate privileges to the DB2 instance owner to execute arbitrary code with root privileges.
2) Buffer overflow (CVE-ID: CVE-2018-1565)
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to buffer overflow in db2exmig and db2exfm. A local attacker can trigger memory corruption and escalate privileges to the DB2 instance owner to execute arbitrary code with root privileges.
The weakness exists due to buffer overflow in db2exmig and db2exfm. A local attacker can trigger memory corruption and escalate privileges to the DB2 instance owner to execute arbitrary code with root privileges.
3) Buffer overflow (CVE-ID: CVE-2018-1488)
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to buffer overflow in db2licm. A local attacker can trigger memory corruption and escalate privileges to the DB2 instance owner to execute arbitrary code with root privileges.
The weakness exists due to buffer overflow in db2licm. A local attacker can trigger memory corruption and escalate privileges to the DB2 instance owner to execute arbitrary code with root privileges.
4) Buffer overflow (CVE-ID: CVE-2018-1515)
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to buffer overflow in db2convert. A local attacker can trigger memory corruption and escalate privileges to the DB2 instance owner to execute arbitrary code with root privileges.
The weakness exists due to buffer overflow in db2convert. A local attacker can trigger memory corruption and escalate privileges to the DB2 instance owner to execute arbitrary code with root privileges.
5) Stack-based buffer overflow (CVE-ID: CVE-2018-1459)
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to stack based buffer overflow in Db2's rah.exe. A local attacker can trigger memory corruption and escalate privileges to the DB2 instance owner to execute arbitrary code with root privileges.
The weakness exists due to stack based buffer overflow in Db2's rah.exe. A local attacker can trigger memory corruption and escalate privileges to the DB2 instance owner to execute arbitrary code with root privileges.
Remediation
Install update from vendor's website.