There is a buffer overflow in several versions of Oracle Database. The impact of this vulnerability may include the execution of arbitrary code; the ability to read, modify, or delete information stored in underlying Oracle databases; and denial of service.
A buffer overflow exists in Oracle9i Release 2, Oracle9i Release 1, and multiple versions of Oracle8i. For more detailed information on versions affected, please see Oracle Security Alert 57. The buffer overflow exists in a portion of code designed to log attempts to exploit a previously discovered vulnerability, described here:
Risk to exposure is low, as the CREATE LIBRARY or the CREATE ANY LIBRARY privilege is needed to exploit these vulnerabilities.
On the other hand, the NGSSoftware Advisory asserts an unauthenticated remote attacker can exploit the vulnerability. Quoting from NGSSoftware Advisory #NISR25072003:
As this does not require a user ID or password it must be stressed that this is a critical vulnerability.
This discrepancy is being discussed in a public forum, too:
Tina Bird's Post - <http://www.securityfocus.com/archive/1/330529>
David Litchfield's Response - <http://www.securityfocus.com/archive/1/330566>
On 09/04/2003 Oracle Security Alert 57 was updated to read "These potential vulnerabilities can be exploited in some cases without a username and password."
An intruder who exploits this vulnerability can remotely execute arbitrary code. On UNIX systems, this code runs as the 'oracle' user. From there, it is likely that an intruder could leverage that access to gain additional control over the system. If running on Windows systems, the intruder's code will run in the Local System security context. In either case, the data contained in the database is at risk.
Apply a patch, as described in Oracle Security Alert 57. Note that Oracle has indicated the following in their security alert, "Currently, due to architectural constraints, there are no plans to release a patch for versions 22.214.171.124, 126.96.36.199, 8.1.6.x, 8.1.5.x, 188.8.131.52, 8.0.5.x, 7.3.x, or other patchsets of the supported releases."
This vulnerability was discovered by David Litchfield and Chris Anley of NGSSoftware Insight Security Research.
This document was written by Ian A Finlay.
|Date First Published:||2003-07-28|
|Date Last Updated:||2003-09-12 19:41 UTC|