| VID |
25032 |
| Severity |
40 |
| Port |
1521, ... |
| Protocol |
TCP |
| Class |
DB |
| Detailed Description |
The Oracle Database Server, according to its version number, has multiple Parameter/Statement buffer overflow vulnerabilities. Oracle9i Database Servers prior to Oracle 9i Database Release 2 version 9.2.0.3 are vulnerable to buffer overflows in the NUMTOYMINTERVAL, NUMTODSINTERVAL, FROM_TZ functions and in the TIME_ZONE environment variable, caused by improper bounds checking. A remote attacker with a database account could supply a long parameter to overflow a buffer and cause the server to crash or to gain the control on the whole database or even to execute arbitrary code on the system.
* Note: This check solely relied on the version number of the remote Oracle Listener to assess this vulnerability, so this might be a false positive.
* References: http://www.nextgenss.com/advisories/ora_numtoyminterval.txt http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0031.html http://www.nextgenss.com/advisories/ora_time_zone.txt
* Platforms Affected: Oracle Oracle9i Database Server Release 2 prior to 9.2.0.3 Microsoft Windows Any version Unix Any version Linux Any version |
| Recommendation |
Upgrade to the latest version of Oracle Database Server Release 2 (9.2.0.3 or later), available from the Oracle MetaLink Web site at http://metalink.oracle.com |
| Related URL |
CVE-2003-1208 (CVE) |
| Related URL |
9587 (SecurityFocus) |
| Related URL |
15060 (ISS) |
|