[<prev] [next>] [day] [month] [year] [list]
Message-ID: <40237CE0.6060200@qsc.de>
From: olaf.hahn at qsc.de (Olaf Hahn)
Subject: Oracle9i Database Multiple Buffer Overflow Vulnerabilities
*TITLE:*
Oracle9i Database Multiple Buffer Overflow Vulnerabilities
*SECUNIA ADVISORY ID:*
SA10805
*RELEASE DATE:*
2004-02-06
*VERIFY ADVISORY:*
http://www.secunia.com/advisories/10805/
*CRITICAL:*
Moderately critical
*WHERE:*
From local network
*IMPACT:*
Privilege escalation
System access
*SOFTWARE:*
Oracle9i Database Enterprise Edition
Oracle9i Database Standard Edition
*DESCRIPTION:*
Cesar Cerrudo and Mark Litchfield have discovered multiple
vulnerabilities in Oracle9i Database, which can be exploited by
malicious database users to compromise the system and gain escalated
privileges.
The first vulnerabilities are caused due to boundary errors in two
functions used for interval conversion ("NUMTOYMINTERVAL" and
"NUMTODSINTERVAL"). These can be exploited to cause buffer overflows by
supplying an overly long "char_expr" string.
These two vulnerabilities have been reported in versions prior to
9.2.0.4 (Patchset 3).
The last two vulnerabilities are caused due to boundary errors in the
"FROM_TZ" function and in the "TIME_ZONE" parameter.
Both vulnerabilities reportedly affect versions prior to 9.2.0.3.
Successful exploitation of the vulnerabilities may allow a malicious,
unprivileged database user to execute arbitrary code with either SYSTEM
or ORACLE privileges.
*SOLUTION:*
Update to version 9.2.0.4 and apply Patch 3, which reportedly is
available via the Metalink site:
http://metalink.oracle.com/
*REPORTED BY CREDITS:*
Cesar Cerrudo
Mark Litchfield, NGSSoftware.
*ORIGINAL ADVISORY:*
NGSSoftware: Oracle NUMTOYMINTERVAL Remote System Overflow
http://www.nextgenss.com/advisories/ora_numtoyminterval.txt
NGSSoftware: Oracle NUMTODSINTERVAL Remote System Overflow
http://www.nextgenss.com/advisories/ora_numtodsinterval.txt
NGSSoftware: Oracle TIME_ZONE Remote System Buffer Overrun
http://www.nextgenss.com/advisories/ora_time_zone.txt
NGSSoftware: Oracle FROM_TZ Remote System Buffer Overrun
http://www.nextgenss.com/advisories/ora_from_tz.txt
--
Mit freundlichen Gr?ssen
Olaf Hahn
Datennetzdienste/Security
QSC AG
Mathias-Br?ggen-Str. 55
50829 K?ln
Phone: +49 221 6698-443
Fax: +49 221 6698-409
E-Mail: olaf.hahn@....de
Internet: http://www.qsc.de
************************************
Paranoid zu sein heisst nicht, dass
nicht doch jemand hinter einem steht
************************************
Powered by blists - more mailing lists