search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Objectivity/DB administration tools lack authentication

Vulnerability Note VU#782567

Original Release Date: 2011-01-13 | Last Revised: 2011-01-13


The administration tools (i.e. ookillls, oostopams, etc) for Objectivity/DB do not require authentication for local or remote operation.


Objectivity/DB comes with several administration tools for database maintenance. By design, these tools do not require authentication. An attacker can emulate the functionality of the administration tools with a custom script as well.


An unauthenticated remote attacker can run commands on the database server. Confidentiality, Integrity, and Availability of the data can be compromised by the attacker.


We are currently unaware of a practical solution to this problem.

Appropriate firewall rules should be implemented to restrict remote access to only trusted sources or blocked entirely and administration only done locally. TCP ports 6779 and 6780 should be filtered.

Vendor Information


Objectivity Inc Affected

Notified:  November 05, 2010 Updated: December 02, 2010



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A



Thanks to Jeremy Brown for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

CVE IDs: None
Severity Metric: 5.52
Date Public: 2011-01-13
Date First Published: 2011-01-13
Date Last Updated: 2011-01-13 19:28 UTC
Document Revision: 11

Sponsored by CISA.