lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: olaf.hahn at qsc.de (Olaf Hahn)
Subject: Oracle9i Database Multiple Buffer Overflow Vulnerabilities

*TITLE:*
Oracle9i Database Multiple Buffer Overflow Vulnerabilities

*SECUNIA ADVISORY ID:*
SA10805

*RELEASE DATE:*
2004-02-06

*VERIFY ADVISORY:*
http://www.secunia.com/advisories/10805/

*CRITICAL:*
Moderately critical

*WHERE:*
 From local network

*IMPACT:*
Privilege escalation
System access

*SOFTWARE:*
Oracle9i Database Enterprise Edition
Oracle9i Database Standard Edition

*DESCRIPTION:*
Cesar Cerrudo and Mark Litchfield have discovered multiple 
vulnerabilities in Oracle9i Database, which can be exploited by 
malicious database users to compromise the system and gain escalated 
privileges.

The first vulnerabilities are caused due to boundary errors in two 
functions used for interval conversion ("NUMTOYMINTERVAL" and 
"NUMTODSINTERVAL"). These can be exploited to cause buffer overflows by 
supplying an overly long "char_expr" string.

These two vulnerabilities have been reported in versions prior to 
9.2.0.4 (Patchset 3).

The last two vulnerabilities are caused due to boundary errors in the 
"FROM_TZ" function and in the "TIME_ZONE" parameter.

Both vulnerabilities reportedly affect versions prior to 9.2.0.3.

Successful exploitation of the vulnerabilities may allow a malicious, 
unprivileged database user to execute arbitrary code with either SYSTEM 
or ORACLE privileges.

*SOLUTION:*
Update to version 9.2.0.4 and apply Patch 3, which reportedly is 
available via the Metalink site:
http://metalink.oracle.com/

*REPORTED BY CREDITS:*
Cesar Cerrudo
Mark Litchfield, NGSSoftware.

*ORIGINAL ADVISORY:*
NGSSoftware: Oracle NUMTOYMINTERVAL Remote System Overflow
http://www.nextgenss.com/advisories/ora_numtoyminterval.txt

NGSSoftware: Oracle NUMTODSINTERVAL Remote System Overflow
http://www.nextgenss.com/advisories/ora_numtodsinterval.txt

NGSSoftware: Oracle TIME_ZONE Remote System Buffer Overrun
http://www.nextgenss.com/advisories/ora_time_zone.txt

NGSSoftware: Oracle FROM_TZ Remote System Buffer Overrun
http://www.nextgenss.com/advisories/ora_from_tz.txt

-- 


Mit freundlichen Gr?ssen 

Olaf Hahn 
Datennetzdienste/Security 
QSC AG 

Mathias-Br?ggen-Str. 55 
50829 K?ln 
Phone: +49 221 6698-443 
Fax: +49 221 6698-409 
E-Mail: olaf.hahn@....de
Internet: http://www.qsc.de

************************************
Paranoid zu sein heisst nicht, dass 
nicht doch jemand hinter einem steht
************************************


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ