Korean
<< Back
VID 25032
Severity 40
Port 1521, ...
Protocol TCP
Class DB
Detailed Description The Oracle Database Server, according to its version number, has multiple Parameter/Statement buffer overflow vulnerabilities. Oracle9i Database Servers prior to Oracle 9i Database Release 2 version 9.2.0.3 are vulnerable to buffer overflows in the NUMTOYMINTERVAL, NUMTODSINTERVAL, FROM_TZ functions and in the TIME_ZONE environment variable, caused by improper bounds checking. A remote attacker with a database account could supply a long parameter to overflow a buffer and cause the server to crash or to gain the control on the whole database or even to execute arbitrary code on the system.

* Note: This check solely relied on the version number of the remote Oracle Listener to assess this vulnerability, so this might be a false positive.

* References:
http://www.nextgenss.com/advisories/ora_numtoyminterval.txt
http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0031.html
http://www.nextgenss.com/advisories/ora_time_zone.txt

* Platforms Affected:
Oracle Oracle9i Database Server Release 2 prior to 9.2.0.3
Microsoft Windows Any version
Unix Any version
Linux Any version
Recommendation Upgrade to the latest version of Oracle Database Server Release 2 (9.2.0.3 or later), available from the Oracle MetaLink Web site at http://metalink.oracle.com
Related URL CVE-2003-1208 (CVE)
Related URL 9587 (SecurityFocus)
Related URL 15060 (ISS)