CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
27.4%
According to its version, the installation of IBM DB2 Connect on the remote Windows host is either 9.7 prior to Fix Pack 11 Special Build 36621, 10.1 prior to Fix Pack 6 Special Build 36610, 10.5 prior to Fix Pack 8 Special Build 36605, or 11.1.2 prior to Fix Pack 2. It is, therefore, affected by the following vulnerabilities :
A buffer overflow condition exists due to improper validation of user-supplied input. A local attacker can exploit this to overwrite DB2 files or cause a denial of service condition. (CVE-2017-1105)
A stack-based buffer overflow condition exists in the Command Line Process (CLP) due to improper bounds checking. A local attacker can exploit this to execute arbitrary code. (CVE-2017-1297)
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(101163);
script_version("1.6");
script_cvs_date("Date: 2019/11/12");
script_cve_id("CVE-2017-1105", "CVE-2017-1297");
script_bugtraq_id(99264, 99271);
script_name(english:"IBM DB2 Connect 9.7 < FP11 Special Build 36621 / 10.1 < FP6 Special Build 36610 / 10.5 < FP8 Special Build 36605 / 11.1.2 < FP2 Multiple Vulnerabilities (Windows)");
script_summary(english:"Checks the DB2 Connect signature.");
script_set_attribute(attribute:"synopsis", value:
"The remote database server is affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"According to its version, the installation of IBM DB2 Connect on the
remote Windows host is either 9.7 prior to Fix Pack 11 Special Build
36621, 10.1 prior to Fix Pack 6 Special Build 36610, 10.5 prior to
Fix Pack 8 Special Build 36605, or 11.1.2 prior to Fix Pack 2. It is,
therefore, affected by the following vulnerabilities :
- A buffer overflow condition exists due to improper
validation of user-supplied input. A local attacker can
exploit this to overwrite DB2 files or cause a denial of
service condition. (CVE-2017-1105)
- A stack-based buffer overflow condition exists in the
Command Line Process (CLP) due to improper bounds
checking. A local attacker can exploit this to execute
arbitrary code. (CVE-2017-1297)");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg22003877");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg22004878");
script_set_attribute(attribute:"solution", value:
"Apply the appropriate IBM DB2 Connect Fix Pack or Special Build
based on the most recent fix pack level for your branch.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-1297");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/06/22");
script_set_attribute(attribute:"patch_publication_date", value:"2017/06/22");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/06/30");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:db2_connect");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("db2_and_db2_connect_installed.nbin");
script_require_keys("SMB/db2_connect/Installed");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("install_func.inc");
include("misc_func.inc");
include("db2_report_func.inc");
app = "DB2 Connect Server";
if(!get_kb_item("SMB/db2_connect/Installed")) audit(AUDIT_NOT_INST, app);
install = get_single_install(app_name:app, exit_if_unknown_ver:TRUE);
version = report_version = install['version'];
special_build = install['special_build'];
if (empty_or_null(special_build)) special_build = "None";
if (special_build != "None") report_version += " with Special Build " + special_build;
path = install['path'];
fix_ver = NULL;
fix_build = NULL;
if (version =~ "^9\.7\.")
{
fix_ver = "9.7.1100.358";
fix_build = "36621";
}
else if (version =~ "^10\.1\.")
{
fix_ver = "10.1.600.582";
fix_build = "36610";
}
else if (version =~ "^10\.5\.")
{
fix_ver = "10.5.800.384";
fix_build = "36605";
}
else if (version =~ "^11\.")
fix_ver = "11.1.2020.1393";
else
audit(AUDIT_INST_PATH_NOT_VULN, app, report_version, path);
vuln = FALSE;
cmp = ver_compare(ver:version, fix:fix_ver, strict:FALSE);
# less than current fix pack
if (cmp < 0)
vuln = TRUE;
else if (cmp == 0 && !isnull(fix_build))
{
# missing special build or less than current special build
if (special_build == "None" || ver_compare(ver:special_build, fix:fix_build, strict:FALSE) < 0)
vuln = TRUE;
}
if (!vuln)
audit(AUDIT_INST_PATH_NOT_VULN, app, report_version, path);
port = get_kb_item("SMB/transport");
if (!port) port = 445;
report_db2(
severity : SECURITY_WARNING,
port : port,
product : app,
path : path,
installed_version : version,
fixed_version : fix_ver,
special_installed : special_build,
special_fix : fix_build);
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
27.4%