Vulnerability Note VU#936868
Oracle Database Server contains stack overflow in logging mechanism when supplied overly long library name
There is a buffer overflow in several versions of Oracle Database. The impact of this vulnerability may include the execution of arbitrary code; the ability to read, modify, or delete information stored in underlying Oracle databases; and denial of service.
A buffer overflow exists in Oracle9i Release 2, Oracle9i Release 1, and multiple versions of Oracle8i. For more detailed information on versions affected, please see Oracle Security Alert 57. The buffer overflow exists in a portion of code designed to log attempts to exploit a previously discovered vulnerability, described here:
An intruder who exploits this vulnerability can remotely execute arbitrary code. On UNIX systems, this code runs as the 'oracle' user. From there, it is likely that an intruder could leverage that access to gain additional control over the system. If running on Windows systems, the intruder's code will run in the Local System security context. In either case, the data contained in the database is at risk.
Apply a patch, as described in Oracle Security Alert 57. Note that Oracle has indicated the following in their security alert, "Currently, due to architectural constraints, there are no plans to release a patch for versions 184.108.40.206, 220.127.116.11, 8.1.6.x, 8.1.5.x, 18.104.22.168, 8.0.5.x, 7.3.x, or other patchsets of the supported releases."
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Oracle Corporation||Affected||-||25 Jul 2003|
CVSS Metrics (Learn More)
This vulnerability was discovered by David Litchfield and Chris Anley of NGSSoftware Insight Security Research.
This document was written by Ian A Finlay.
- CVE IDs: Unknown
- Date Public: 25 Jul 2003
- Date First Published: 28 Jul 2003
- Date Last Updated: 12 Sep 2003
- Severity Metric: 31.64
- Document Revision: 31
If you have feedback, comments, or additional information about this vulnerability, please send us email.