search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Oracle 8i contains buffer overflow in TNS Listener

Vulnerability Note VU#620495

Original Release Date: 2001-06-28 | Last Revised: 2001-08-15


A vulnerability in Oracle 8i allows intruders to assume control of the database server and/or the operating system on which the database server is running, depending on the platform used.


The COVERT labs at PGP Security have discovered a buffer overflow vulnerability in Oracle 8i allows intruders to execute arbitrary code with the privileges of the process running the TNS listener process. The vulnerability occurs in a section of code that is executed prior to authentication, so an intruder does not require a username or password.

For more information, see the COVERT Labs Security Advisory, available at


An intruder who exploits the vulnerability can execute arbitrary code as the 'oracle' user on UNIX systems, and in the Local System security context on Windows systems. In both cases, the attacker can gain gain control of database services on the victim machine; on Windows systems, the intruder can additionally gain administrative control of the operating system as well.


According to COVERT Labs, patches for this vulnerability are available from Oracle, "under bug number 1489683 which is available for download from the Oracle Worldwide Support Services web site, Metalink ( for the platforms identified in this advisory. The patch is in production for all supported releases of the Oracle Database Server."

Use a packet filter or firewall to restrict access to port 1521 on vulnerable machines. This may reduce your exposure to this problem until a patch can be applied.

Vendor Information

CVSS Metrics

Group Score Vector



Our thanks to COVERT Labs at PGP Security for the information contained in their advisory.

This document was written by Shawn Hernan.

Other Information

CVE IDs: CVE-2001-0499
Severity Metric: 34.79
Date Public: 2001-06-27
Date First Published: 2001-06-28
Date Last Updated: 2001-08-15 21:45 UTC
Document Revision: 8

Sponsored by CISA.