ASI Sybase Security Alert: Buffer overflow in DBCC CHECKVERIFY

From: Aaron C. Newman (Application Security, Inc.) (anewmanat_private)
Date: Wed Nov 27 2002 - 11:14:25 PST

  • Next message: Stuart Moore: "Cross-site Scripting Vulnerability in ImageFolio Image Gallery Software"

    Sybase Adaptive Server buffer overflow in DBCC CHECKVERIFY
    
    http://www.appsecinc.com/resources/alerts/sybase/02-0001.html
    
    To determine if you should apply this hot fix, download AppDetective for
    Sybase from http://www.sybasesecurity.net/products/appdetective/sybase/.
    
    Risk level: High
    
    Threat: Allows a non-privileged login to gain full control of the server
    
    Versions Affected: Sybase Adaptive Server 12.0 and 12.5
    
    Summary:
    Sybase Adaptive Server provides a built-in function called DBCC
    CHECKVERIFY. This function is used to verify the results of the most
    recent run of DBCC CHECKSTORAGE.
    
    Details:
    DBCC CHECKVERIFY accepts a single parameter that is the name of the
    database to check. DBCC CHECKVERIFY does not validate the length of the
    string passed into the first parameter. This buffer overflow may allow
    an attacker to run arbitrary code under the security context of the
    server.
    
    Below is an example of overflowing the buffer using the SQL tool
    isql.exe.
    
    1> declare @test varchar(16384)
    2> select @test = replicate(‘A’, 16384)
    3> DBCC CHECKVERIFY(@test)
    4> go
    
    Fix:
    You should apply the following patches:
    12.5.0.2 - 11/14/2002
    12.0.0.6 ESD#1 - 11/5/2002
    
    These patches can be downloaded from http://downloads.sybase.com/swd/swx
    
    Thank you,
    supportat_private
    Application Security, Inc.
    phone: 212-490-6022
    fax: 212-490-6456
    -Protection Where It Counts-
    
    ----------------------------------------------------------------------
    Application Security, Inc.
    www.appsecinc.com
    
    As pioneers in application security, we are an organization dedicated 
    to the security, defense, and protection of one of the most commonly 
    overlooked areas of security - the application layer. Application 
    Security, Inc. provides solutions to proactively secure (penetration 
    testing/vulnerability assessment), actively defend/monitor (intrusion 
    detection), and protect (encryption) your most critical applications.
    ----------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Sat Nov 30 2002 - 10:40:57 PST