Executive Summary

Summary
Title Objectivity/DB administration tools lack authentication
Informations
Name VU#782567 First vendor Publication 2011-01-13
Vendor VU-CERT Last vendor Modification 2011-01-13
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#782567

Objectivity/DB administration tools lack authentication

Overview

The administration tools (i.e. ookillls, oostopams, etc) for Objectivity/DB do not require authentication for local or remote operation.

I. Description

Objectivity/DB comes with several administration tools for database maintenance. By design, these tools do not require authentication. An attacker can emulate the functionality of the administration tools with a custom script as well.

II. Impact

An unauthenticated remote attacker can run commands on the database server. Confidentiality, Integrity, and Availability of the data can be compromised by the attacker.

III. Solution

We are currently unaware of a practical solution to this problem.

Appropriate firewall rules should be implemented to restrict remote access to only trusted sources or blocked entirely and administration only done locally. TCP ports 6779 and 6780 should be filtered.

Vendor Information

VendorStatusDate NotifiedDate Updated
Objectivity IncAffected2010-11-052010-12-02

References

http://devnet.objectivity.com/files/docs/objy_docs/latest/administration.pdf

Credit

Thanks to Jeremy Brown for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

Date Public:2011-01-13
Date First Published:2011-01-13
Date Last Updated:2011-01-13
CERT Advisory: 
CVE-ID(s): 
NVD-ID(s): 
US-CERT Technical Alerts: 
Severity Metric:5.52
Document Revision:11

Original Source

Url : http://www.kb.cert.org/vuls/id/782567

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-287 Improper Authentication

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

ExploitDB Exploits

id Description
2011-01-14 Objectivity/DB Lack of Authentication Remote Exploit

Open Source Vulnerability Database (OSVDB)

Id Description
70424 Objectivity/DB Multiple Administrative Operations Authentication Bypass

Objectivity/DB contains a flaw related to the some components' allowing multiple administrative operations to be performed without authentication. This may allow a remote attacker to bypass authentication.