A buffer overflow in some command-line utilities supplied with the Oracle Database Server could allow a local user to gain the privileges of the oracle system user.
The Oracle 9i Database Server package includes the oracle and oracleO command-line client programs to connect to systems running the database server. These commands are the same underlying program, but take different actions based on which one is invoked (argv). A buffer overflow flaw has been discovered in the way these programs process their first argument (argv). An overly long string supplied in this argument may allow an attacker to run code of their own chosing in the context of the oracle system user.
This vulnerability is reported to affect the Oracle 9i product on all UNIX and Linux system platforms that Oracle supports. It was originally reported that this vulnerability affected the Oracle 8i product, but Oracle has since reported that this product is not vulnerable.
An attacker with local access to the system on which the Oracle system is installed may be able to execute arbitrary code with the privileges of the oracle user and the dba group. This allows the attacker to take any action that the database administrator is authorized to take. Attackers may be able to gain additional system privileges, depending on how the system is configured.
Apply a patch from the vendor
Thanks to Oracle Security Advisory for reporting this vulnerability.
This document was written by Chad R Dougherty.
|Date First Published:||2003-11-05|
|Date Last Updated:||2003-11-05 15:56 UTC|