Vulnerability Note VU#819126

Oracle9i Database contains buffer overflow in NUMTOYMINTERVAL() function

Original Release date: 27 Feb 2004 | Last revised: 27 Feb 2004

Overview

Oracle9i Database contains a buffer overflow in the NUMTOYMINTERVAL() function which could allow anyone who can query the server to execute arbitrary code or access data with the privileges of the vulnerable process.

Description

A buffer overflow exists in the NUMTOYMINTERVAL() function. This function is responsible for handling date conversions. By supplying an overly long character string to the function, an attacker could overwrite a return address on the stack, resulting in the ability to execute arbitrary code or access data with the privileges of the vulnerable process. Oracle typically runs as SYSTEM on Windows and as the ORACLE user on UNIX.

Impact

Exploitation may result in the ability to execute arbitrary code or access data with the privileges of the vulnerable process.

Solution

Apply Patch

According to NGSSoftware, this problem is fixed in Oracle 9i Database Release 2, version 9.2.0.3.

    For further information regarding Oracle security patches, please visit the Oracle Metalilnk site:

    Systems Affected (Learn More)

    VendorStatusDate NotifiedDate Updated
    Oracle CorporationAffected-26 Feb 2004
    If you are a vendor and your product is affected, let us know.

    CVSS Metrics (Learn More)

    Group Score Vector
    Base N/A N/A
    Temporal N/A N/A
    Environmental N/A N/A

    References

    Credit

    This vulnerability was reported by NGSSoftware.

    This document was written by Damon Morda.

    Other Information

    • CVE IDs: Unknown
    • Date Public: 06 Feb 2004
    • Date First Published: 27 Feb 2004
    • Date Last Updated: 27 Feb 2004
    • Severity Metric: 13.47
    • Document Revision: 14

    Feedback

    If you have feedback, comments, or additional information about this vulnerability, please send us email.