ID CVE-2003-0845
Summary Unknown vulnerability in the HSQLDB component in JBoss 3.2.1 and 3.0.8 on Java 1.4.x platforms, when running in the default configuration, allows remote attackers to conduct unauthorized activities and possibly execute arbitrary code via certain SQL statements to (1) TCP port 1701 in JBoss 3.2.1, and (2) port 1476 in JBoss 3.0.8.
References
Vulnerable Configurations
  • cpe:2.3:a:jboss:jboss:3.0.8
    cpe:2.3:a:jboss:jboss:3.0.8
  • cpe:2.3:a:jboss:jboss:3.2.1
    cpe:2.3:a:jboss:jboss:3.2.1
CVSS
Base: 7.5 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
exploit-db via4
description JBoss 3.0.8/3.2.1 HSQLDB Remote Command Injection Vulnerability. CVE-2003-0845. Remote exploits for multiple platform
id EDB-ID:23221
last seen 2016-02-02
modified 2003-10-06
published 2003-10-06
reporter Marc Schoenefeld
source https://www.exploit-db.com/download/23221/
title JBoss 3.0.8/3.2.1 HSQLDB Remote Command Injection Vulnerability
nessus via4
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2007-1048.NASL
    description Updated openoffice.org and hsqldb packages that fix security flaws are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. OpenOffice.org is an office productivity suite. HSQLDB is a Java relational database engine used by OpenOffice.org Base. It was discovered that HSQLDB could allow the execution of arbitrary public static Java methods. A carefully crafted odb file opened in OpenOffice.org Base could execute arbitrary commands with the permissions of the user running OpenOffice.org. (CVE-2007-4575) It was discovered that HSQLDB did not have a password set on the 'sa' user. If HSQLDB has been configured as a service, a remote attacker who could connect to the HSQLDB port (tcp 9001) could execute arbitrary SQL commands. (CVE-2003-0845) Note that in Red Hat Enterprise Linux 5, HSQLDB is not enabled as a service by default, and needs manual configuration in order to work as a service. Users of OpenOffice.org or HSQLDB should update to these errata packages which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-12-20
    plugin id 43661
    published 2010-01-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43661
    title CentOS 5 : openoffice.org / hsqldb (CESA-2007:1048)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20071205_OPENOFFICE_ORG__HSQLDB_ON_SL5_X.NASL
    description It was discovered that HSQLDB could allow the execution of arbitrary public static Java methods. A carefully crafted odb file opened in OpenOffice.org Base could execute arbitrary commands with the permissions of the user running OpenOffice.org. (CVE-2007-4575) It was discovered that HSQLDB did not have a password set on the 'sa' user. If HSQLDB has been configured as a service, a remote attacker who could connect to the HSQLDB port (tcp 9001) could execute arbitrary SQL commands. (CVE-2003-0845) Note that in Scientific Linux 5, HSQLDB is not enabled as a service by default, and needs manual configuration in order to work as a service.
    last seen 2019-02-21
    modified 2019-01-07
    plugin id 60324
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=60324
    title Scientific Linux Security Update : openoffice.org, hsqldb on SL5.x i386/x86_64
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2007-1048.NASL
    description Updated openoffice.org and hsqldb packages that fix security flaws are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. OpenOffice.org is an office productivity suite. HSQLDB is a Java relational database engine used by OpenOffice.org Base. It was discovered that HSQLDB could allow the execution of arbitrary public static Java methods. A carefully crafted odb file opened in OpenOffice.org Base could execute arbitrary commands with the permissions of the user running OpenOffice.org. (CVE-2007-4575) It was discovered that HSQLDB did not have a password set on the 'sa' user. If HSQLDB has been configured as a service, a remote attacker who could connect to the HSQLDB port (tcp 9001) could execute arbitrary SQL commands. (CVE-2003-0845) Note that in Red Hat Enterprise Linux 5, HSQLDB is not enabled as a service by default, and needs manual configuration in order to work as a service. Users of OpenOffice.org or HSQLDB should update to these errata packages which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-08-13
    plugin id 63845
    published 2013-01-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=63845
    title RHEL 5 : openoffice.org, hsqldb (RHSA-2007:1048)
oval via4
accepted 2013-04-29T04:13:03.177-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 5
    oval oval:org.mitre.oval:def:11414
  • comment The operating system installed on the system is CentOS Linux 5.x
    oval oval:org.mitre.oval:def:15802
  • comment Oracle Linux 5.x
    oval oval:org.mitre.oval:def:15459
description Unknown vulnerability in the HSQLDB component in JBoss 3.2.1 and 3.0.8 on Java 1.4.x platforms, when running in the default configuration, allows remote attackers to conduct unauthorized activities and possibly execute arbitrary code via certain SQL statements to (1) TCP port 1701 in JBoss 3.2.1, and (2) port 1476 in JBoss 3.0.8.
family unix
id oval:org.mitre.oval:def:11300
status accepted
submitted 2010-07-09T03:56:16-04:00
title Unknown vulnerability in the HSQLDB component in JBoss 3.2.1 and 3.0.8 on Java 1.4.x platforms, when running in the default configuration, allows remote attackers to conduct unauthorized activities and possibly execute arbitrary code via certain SQL statements to (1) TCP port 1701 in JBoss 3.2.1, and (2) port 1476 in JBoss 3.0.8.
version 19
redhat via4
advisories
rhsa
id RHSA-2007:1048
rpms
  • hsqldb-1:1.8.0.4-3jpp.6
  • hsqldb-demo-1:1.8.0.4-3jpp.6
  • hsqldb-javadoc-1:1.8.0.4-3jpp.6
  • hsqldb-manual-1:1.8.0.4-3jpp.6
  • openoffice.org-base-1:2.0.4-5.4.25
  • openoffice.org-calc-1:2.0.4-5.4.25
  • openoffice.org-core-1:2.0.4-5.4.25
  • openoffice.org-draw-1:2.0.4-5.4.25
  • openoffice.org-emailmerge-1:2.0.4-5.4.25
  • openoffice.org-graphicfilter-1:2.0.4-5.4.25
  • openoffice.org-impress-1:2.0.4-5.4.25
  • openoffice.org-javafilter-1:2.0.4-5.4.25
  • openoffice.org-langpack-af_ZA-1:2.0.4-5.4.25
  • openoffice.org-langpack-ar-1:2.0.4-5.4.25
  • openoffice.org-langpack-as_IN-1:2.0.4-5.4.25
  • openoffice.org-langpack-bg_BG-1:2.0.4-5.4.25
  • openoffice.org-langpack-bn-1:2.0.4-5.4.25
  • openoffice.org-langpack-ca_ES-1:2.0.4-5.4.25
  • openoffice.org-langpack-cs_CZ-1:2.0.4-5.4.25
  • openoffice.org-langpack-cy_GB-1:2.0.4-5.4.25
  • openoffice.org-langpack-da_DK-1:2.0.4-5.4.25
  • openoffice.org-langpack-de-1:2.0.4-5.4.25
  • openoffice.org-langpack-el_GR-1:2.0.4-5.4.25
  • openoffice.org-langpack-es-1:2.0.4-5.4.25
  • openoffice.org-langpack-et_EE-1:2.0.4-5.4.25
  • openoffice.org-langpack-eu_ES-1:2.0.4-5.4.25
  • openoffice.org-langpack-fi_FI-1:2.0.4-5.4.25
  • openoffice.org-langpack-fr-1:2.0.4-5.4.25
  • openoffice.org-langpack-ga_IE-1:2.0.4-5.4.25
  • openoffice.org-langpack-gl_ES-1:2.0.4-5.4.25
  • openoffice.org-langpack-gu_IN-1:2.0.4-5.4.25
  • openoffice.org-langpack-he_IL-1:2.0.4-5.4.25
  • openoffice.org-langpack-hi_IN-1:2.0.4-5.4.25
  • openoffice.org-langpack-hr_HR-1:2.0.4-5.4.25
  • openoffice.org-langpack-hu_HU-1:2.0.4-5.4.25
  • openoffice.org-langpack-it-1:2.0.4-5.4.25
  • openoffice.org-langpack-ja_JP-1:2.0.4-5.4.25
  • openoffice.org-langpack-kn_IN-1:2.0.4-5.4.25
  • openoffice.org-langpack-ko_KR-1:2.0.4-5.4.25
  • openoffice.org-langpack-lt_LT-1:2.0.4-5.4.25
  • openoffice.org-langpack-ml_IN-1:2.0.4-5.4.25
  • openoffice.org-langpack-mr_IN-1:2.0.4-5.4.25
  • openoffice.org-langpack-ms_MY-1:2.0.4-5.4.25
  • openoffice.org-langpack-nb_NO-1:2.0.4-5.4.25
  • openoffice.org-langpack-nl-1:2.0.4-5.4.25
  • openoffice.org-langpack-nn_NO-1:2.0.4-5.4.25
  • openoffice.org-langpack-nr_ZA-1:2.0.4-5.4.25
  • openoffice.org-langpack-nso_ZA-1:2.0.4-5.4.25
  • openoffice.org-langpack-or_IN-1:2.0.4-5.4.25
  • openoffice.org-langpack-pa_IN-1:2.0.4-5.4.25
  • openoffice.org-langpack-pl_PL-1:2.0.4-5.4.25
  • openoffice.org-langpack-pt_BR-1:2.0.4-5.4.25
  • openoffice.org-langpack-pt_PT-1:2.0.4-5.4.25
  • openoffice.org-langpack-ru-1:2.0.4-5.4.25
  • openoffice.org-langpack-sk_SK-1:2.0.4-5.4.25
  • openoffice.org-langpack-sl_SI-1:2.0.4-5.4.25
  • openoffice.org-langpack-sr_CS-1:2.0.4-5.4.25
  • openoffice.org-langpack-ss_ZA-1:2.0.4-5.4.25
  • openoffice.org-langpack-st_ZA-1:2.0.4-5.4.25
  • openoffice.org-langpack-sv-1:2.0.4-5.4.25
  • openoffice.org-langpack-ta_IN-1:2.0.4-5.4.25
  • openoffice.org-langpack-te_IN-1:2.0.4-5.4.25
  • openoffice.org-langpack-th_TH-1:2.0.4-5.4.25
  • openoffice.org-langpack-tn_ZA-1:2.0.4-5.4.25
  • openoffice.org-langpack-tr_TR-1:2.0.4-5.4.25
  • openoffice.org-langpack-ts_ZA-1:2.0.4-5.4.25
  • openoffice.org-langpack-ur-1:2.0.4-5.4.25
  • openoffice.org-langpack-ve_ZA-1:2.0.4-5.4.25
  • openoffice.org-langpack-xh_ZA-1:2.0.4-5.4.25
  • openoffice.org-langpack-zh_CN-1:2.0.4-5.4.25
  • openoffice.org-langpack-zh_TW-1:2.0.4-5.4.25
  • openoffice.org-langpack-zu_ZA-1:2.0.4-5.4.25
  • openoffice.org-math-1:2.0.4-5.4.25
  • openoffice.org-pyuno-1:2.0.4-5.4.25
  • openoffice.org-testtools-1:2.0.4-5.4.25
  • openoffice.org-writer-1:2.0.4-5.4.25
  • openoffice.org-xsltfilter-1:2.0.4-5.4.25
refmap via4
bid 8773
bugtraq
  • 20031005 JBoss 3.2.1: Remote Command Injection
  • 20031006 Update JBoss 308 & 321: Remote Command Injection
confirm http://sourceforge.net/docman/display_doc.php?docid=19314&group_id=22866
secunia 27914
Last major update 17-10-2016 - 22:37
Published 17-11-2003 - 00:00
Last modified 10-10-2017 - 21:29
Back to Top