search menu icon-carat-right cmu-wordmark

CERT Coordination Center


Objectivity/DB administration tools lack authentication

Vulnerability Note VU#782567

Original Release Date: 2011-01-13 | Last Revised: 2011-01-13

Overview

The administration tools (i.e. ookillls, oostopams, etc) for Objectivity/DB do not require authentication for local or remote operation.

Description

Objectivity/DB comes with several administration tools for database maintenance. By design, these tools do not require authentication. An attacker can emulate the functionality of the administration tools with a custom script as well.

Impact

An unauthenticated remote attacker can run commands on the database server. Confidentiality, Integrity, and Availability of the data can be compromised by the attacker.

Solution

We are currently unaware of a practical solution to this problem.

Appropriate firewall rules should be implemented to restrict remote access to only trusted sources or blocked entirely and administration only done locally. TCP ports 6779 and 6780 should be filtered.

Vendor Information

782567
Expand all

Objectivity Inc

Notified:  November 05, 2010 Updated:  December 02, 2010

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

Thanks to Jeremy Brown for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

CVE IDs: None
Severity Metric: 5.52
Date Public: 2011-01-13
Date First Published: 2011-01-13
Date Last Updated: 2011-01-13 19:28 UTC
Document Revision: 11

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.