The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NEWS] Oracle SYS_CONTEXT Procedure Buffer Overflow Vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 12 Sep 2004 14:16:05 +0200
From: SecuriTeam <[email protected]>
To: [email protected]
Subject: [NEWS] Oracle SYS_CONTEXT Procedure Buffer Overflow Vulnerability

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -



  Oracle SYS_CONTEXT Procedure Buffer Overflow Vulnerability
------------------------------------------------------------------------


SUMMARY

A buffer overflow vulnerability was found in the SYS_CONTEXT procedure in 
Oracle Database Server allowing a valid database user to execute arbitrary 
code.

DETAILS

Vulnerable Systems:
 * Oracle 9i Release 2 versions 9.2.0.0 up to and including 9.2.0.4 
(Windows platform only)

Immune Systems:
 * Oracle 9i Release 1
 * Oracle 10g

The vulnerability can be exploited by any valid database user able to 
execute SQL commands via SQL Plus. The buffer overflow can then be 
exploited by calling the SYS_CONTEXT() function. As with all buffer 
overflows the cause for the vulnerability is either no bounds checking or 
a degenerate case leading to an overwrite of the buffer due to a 
programming error when performing bounds checking.

Patch Availability:
Please see MetaLink Document ID 281189.1 for the patch download procedures 
and for the Patch Availability Matrix for this Oracle Security Alert which 
can be found at:
 
<http://metalink.oracle.com/metalink/plsql/ml2_documents.showDocument?p_database_id=NOT&p_id=281189.1>; http://metalink.oracle.com/metalink/plsql/ml2_documents.showDocument?p_database_id=NOT&p_id=281189.1

Disclosure Timeline
2 September 2003        Oracle was informed
2 September 2003        Bug confirmed
31 August 2004            Oracle published alert 68


ADDITIONAL INFORMATION

The information has been provided by  
<mailto:[email protected]> Kornbrust, Alexander - Red Database 
Security.
The original article can be found at:  
<http://www.red-database-security.com/advisory/advisory_20040903_2.htm>; 
http://www.red-database-security.com/advisory/advisory_20040903_2.htm




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру