Gupta SQLBase EXECUTE缓冲区溢出漏洞

Gupta SQLBase EXECUTE缓冲区溢出漏洞

漏洞ID 1203087 漏洞类型 缓冲区溢出
发布时间 2003-02-10 更新时间 2003-12-31
图片[1]-Gupta SQLBase EXECUTE缓冲区溢出漏洞-安全小百科CVE编号 CVE-2003-1393
图片[2]-Gupta SQLBase EXECUTE缓冲区溢出漏洞-安全小百科CNNVD-ID CNNVD-200312-122
漏洞平台 N/A CVSS评分 8.5
|漏洞来源
https://cxsecurity.com/issue/WLB-2007100077
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200312-122
|漏洞详情
SQLBase是关系型数据库管理系统,提供结构查询语言的完整实现。SQLBase在使用EXECUTE命令时没有正确检查参数值,远程攻击者可以利用这个漏洞进行缓冲区溢出,可能以SQLBase进程权限在系统上执行任意指令。EXECUTE命令执行一个存储命令或过程,语法如下:EXECUTE[authID].stored_command_or_procedure_name攻击者可以连接SQLBase数据并提供超长的命令/过程名作为参数传递给EXECUTE命令,可导致SQLBase崩溃,精心构建提交数据可能以SQLBase进程权限在系统上执行任意指令(一般来说是LocalSystem权限)。
|漏洞EXP
BUFFER OVERFLOW IN SQLBASE 8.1.0
===================================================
Advisory: Password Disclosure in Cryptainer
Vendor: Gupta Technologies LLC http://www.guptaworldwide.com
Versions affected: SQLBase 8.1.0
Date: 10th February 2003
Type of Vulnerability: Remotely Exploitable Buffer Overflow
Severity: High

Discovered by: Arjun Pednekar arjunp (at) nii.co (dot) in [email concealed]
Network Intelligence India Pvt. Ltd. http://www.nii.co.in
Online location: http://www.nii.co.in/vuln/sqlbase.html
===================================================

I. BACKGROUND

SQLBase 8.1.0 is a fully-relational database management system (RDBMS),
providing complete implementation of Structured Query Language (SQL) as well
as
its own
control language. It is designed and built specifically for PC networks
supporting various LAN/WAN configurations. According to their website, more
than
1 million users have used their technology.

Execute command executes a stored command or procedure. The syntax of this
command is :
    EXECUTE [auth ID].stored_command_or_procedure_name

Passing an extremely large command/procedure name as the parameter to the
Execute command crashes SQLBase, giving the attacker System
Privileges.

II. DESCRIPTION

Buffer overflow occurs when the string length exceeds 700 characters.The
command we executed was as follows:

EXECUTE SYSADM.AAAAAAAAAAA...(700 times)

This was found to be true on a database we had created, but it also
does exist on the default ISLAND database. This could potentially allow
execution of system commands with
privileges of the GuptaSQL Service (Local System). This vulnerability causes
the SQL Base service to crash thus closing down the database. If not for
system
exploitation, it could easily be used for a very simple denial of service
attack.

III. ANALYSIS

Any attacker can exploit this buffer overflow to gain LocalSystem privileges
on the server. SQLBase runs as a Service with LocalSystem privileges. Also,
the attacker can authenticate by using the SYSADM username and a blank
password for the default ISLAND database. Or if this database has been
removed, he must then be a legitimate user. But he need not be the SYSADM,
any ordinary user can execute the overflow.

IV. DETECTION
Buffer Overflow in EXECUTE Command was detected in earlier version of
SQLBase (v 8.0.0) by NII in early January. The vendor released a list of
patches
to this version one of which was bug ID 76532B
http://www.guptaworldwide.com/tech/support/81fixes.htm
However it seems that the vendor has not patched the latest version
correctly.
The new version, v 8.1.0, also has
a similar vulnerability but it requires 700 characters instead of the
earlier
350

V. RECOVERY
The SQLBase Service crashes and it needs to be then restarted. But since it
runs with LocalSystem privileges, a buffer overflow in it allows the
attacker full access to the system.

VI. VENDOR RESPONSE
The vendor acknowledged this vulnerability and partially rectified it in
release 8.1.0.
LogABug of Gupta WorldWide has given the following ID to this issue.
Defect ID:     76532B
This bug has not been properly rectified. In the old 8.0.0 version, the BO
was at 350 characters, whereas in the new version it takes 700 characters to
crash the service.

VII. DISCLOSURE TIMELINE
January 3rd : Buffer Over flow found in SQLBase 8.0.0 EXECUTE command
January 4th : Reported to Vendor
January 6th : Response from LogaBug (logabug (at) guptaworldwide (dot) com [email concealed])
January 20th : SQLBase version 8.1.0 released which "claimed" to have
patched the above vulnerability
January 29th : A similar BOF found in the new version 8.1.0, but now with
700 chars instead of 350
January 29th : Reported to Vendor. We did not get any confirmation even
after
reminding them about it.

Other advisories:
http://www.nii.co.in/research/advisories.html

We believe in Responsible Disclosure and you may read our Policy at
http://www.nii.co.in/vdp.html

Arjun Pednekar
Systems Security Analyst
Network Intelligence India Pvt. Ltd.
Web: www.nii.co.in
Tel: 91-22-22001530/22006019
=================================
AuditPro for Oracle
http://www.nii.co.in/software/aporace.html
Comprehensive Host-based Oracle Auditing Software
=================================
|参考资料

来源:XF
名称:sqlbase-execute-long-bo(11269)
链接:http://xforce.iss.net/xforce/xfdb/11269
来源:BID
名称:6808
链接:http://www.securityfocus.com/bid/6808
来源:BUGTRAQ
名称:20030308NIIAdvisory-BufferOverflowinSQLBase(Revised)
链接:http://www.securityfocus.com/archive/1/314379
来源:BUGTRAQ
名称:20030210BufferOverFlowinSQLBase8.1.0-NIIAdvisory
链接:http://www.securityfocus.com/archive/1/311159
来源:SECUNIA
名称:8023
链接:http://secunia.com/advisories/8023
来源:SREASON
名称:3256
链接:http://securityreason.com/securityalert/3256
来源:NSFOCUS
名称:4368
链接:http://www.nsfocus.net/vulndb/4368

相关推荐: aVirt Mail Server Buffer Overflow

aVirt Mail Server Buffer Overflow 漏洞ID 1104464 漏洞类型 Boundary Condition Error 发布时间 1999-10-31 更新时间 1999-10-31 CVE编号 N/A CNNVD-ID N/…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享