11th Feb 2003 [SBWID-5985]
COMMAND
	SQLBase Buffer OverFlow
SYSTEMS AFFECTED
	SQLBase 8.1.0
PROBLEM
	In  an  advisory  by  Arjun  Pednekar  [[email protected]]   of   Network
	Intelligence India Pvt. Ltd. [http://www.nii.co.in] :
	
	 http://www.nii.co.in/vuln/sqlbase.html
	
	--snip--
	Execute command executes a stored command or procedure.  The  syntax  of
	this command is :
	
	    EXECUTE [auth ID].stored_command_or_procedure_name
	
	Passing an extremely large command/procedure name as  the  parameter  to
	the  Execute  command  crashes  SQLBase,  giving  the  attacker   System
	Privileges.
	 DESCRIPTION
	 ===========
	Buffer  overflow   occurs   when   the   string   length   exceeds   700
	characters.The command we executed was as follows:
	
	     EXECUTE SYSADM.AAAAAAAAAAA...(700 times)
	
	This was found to be true on a database we  had  created,  but  it  also
	does exist on the default ISLAND database. This could potentially  allow
	execution of system commands with privileges  of  the  GuptaSQL  Service
	(Local System). This vulnerability causes the SQL Base service to  crash
	thus closing down the database.  If  not  for  system  exploitation,  it
	could easily be used for a very simple denial of service
	--snap--
	Buffer Overflow in EXECUTE Command was detected in  earlier  version  of
	SQLBase (v 8.0.0) by NII in early January. The vendor  released  a  list
	of patches to this version one of which was bug ID 76532B
	
	 http://www.guptaworldwide.com/tech/support/81fixes.htm
	
	However it seems that the vendor has  not  patched  the  latest  version
	correctly. The new version, v 8.1.0, also has  a  similar  vulnerability
	but it requires 700 characters instead of the earlier 350.
SOLUTION
	Check Gupta Technologies LLC
	
	 http://www.guptaworldwide.com