Zero-Day Advisory

Fortinet Discovers Teradata Gateway Remote DoS Vulnerability

Summary

Fortinet's FortiGuard Labs has discovered a critical denial of service (DoS) vulnerability in Teradata tgtw and TDExpress.
Teradata is a leading provider of powerful enterprise big data analytics and services that include Data Warehousing, Data Driven Marketing, BI and CRM.
A remote DoS vulnerability exists in Teradata tgtw and TDExpress. This vulnerability is caused due to insufficient validation on a malformed CONFIG REQUEST message, which can subsequently cause a database crash. A malicious user could, therefore, craft a malformed request message that results in a denial of service.

Solutions

FortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:

Teradata.Gateway.Remote.DoS
Released Jul 19, 2015

The vendor has fixed them in following versions:
tgtw-15.00.03.02-1
tgtw-15.10.00.01-1
TDExpress15.00.02.08_Sles10_40GB_vp.7z
TDExpress15.00.02.08_Sles11_40GB.7z

Additional Information

Authentication is not required to exploit this DoS vulnerability. So its severity is very high due to the high exploitability.

Acknowledgement

This vulnerability was discovered by Honggang Ren of Fortinet's FortiGuard Labs.

IPS Subscription

Fortinet customers who subscribe to Fortinet's intrusion prevention (IPS) service should be protected against this vulnerability with the appropriate configuration parameters in place. Fortinet's IPS service is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and antispam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by FortiGuard Labs, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle.