Short Name |
APP:IBM:SET-ENVIRONMENT-BOF |
---|---|
Severity |
Major |
Recommended |
No |
Category |
APP |
Keywords |
IBM Informix Dynamic Server SET ENVIRONMENT Stack Buffer Overflow |
Release Date |
2011/02/28 |
Update Number |
1873 |
Supported Platforms |
idp-4.0+, isg-3.4+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known stack buffer overflow vulnerability in IBM Informix Dynamic Server. It is due to insufficient bound checking on a user-supplied buffer length value in a SET ENVIRONMENT SQL statement. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the IBM Informix Dynamic Server.
IBM Informix is prone to a remote code-execution vulnerability because the application fails to perform adequate boundary checks on user-supplied data. Successfully exploiting this issue may allow an attacker to execute arbitrary code with SYSTEM-level privileges, completely compromising affected computers. Failed exploit attempts will result in a denial-of-service condition.