Vulnerability Note VU#399806
Oracle9i Database contains buffer overflow in FROM_TZ() function
Oracle9i Database contains a buffer overflow in the FROM_TZ() function which could allow anyone who can query the server to execute arbitrary code or access data with the privileges of the vulnerable process.
A buffer overflow exists in the FROM_TZ() function. This function is responsible for handling time stamp conversions. By supplying an overly long character string to the Time Zone Difference (TZD) parameter of the FROM_TZ() function, an attacker could overwrite a return address on the stack, resulting in the ability to execute arbitrary code or access data with the privileges of the vulnerable process. Oracle typically runs as SYSTEM on Windows and as the ORACLE user on UNIX.
Exploitation may result in the ability to execute arbitrary code or access data with the privileges of the vulnerable process.
According to NGSSoftware, this problem is fixed in Oracle 9i Database Release 2, version 126.96.36.199.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Oracle Corporation||Affected||-||27 Feb 2004|
CVSS Metrics (Learn More)
This vulnerability was reported by NGSSoftware.
This document was written by Damon Morda.
- CVE IDs: Unknown
- Date Public: 06 Feb 2004
- Date First Published: 27 Feb 2004
- Date Last Updated: 27 Feb 2004
- Severity Metric: 13.47
- Document Revision: 9
If you have feedback, comments, or additional information about this vulnerability, please send us email.