Date: 12 Sep 2004 14:16:05 +0200
From: SecuriTeam <[email protected]>
To: [email protected]Subject: [NEWS] Oracle SYS_CONTEXT Procedure Buffer Overflow Vulnerability
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html
- - - - - - - - -
Oracle SYS_CONTEXT Procedure Buffer Overflow Vulnerability
------------------------------------------------------------------------
SUMMARY
A buffer overflow vulnerability was found in the SYS_CONTEXT procedure in
Oracle Database Server allowing a valid database user to execute arbitrary
code.
DETAILS
Vulnerable Systems:
* Oracle 9i Release 2 versions 9.2.0.0 up to and including 9.2.0.4
(Windows platform only)
Immune Systems:
* Oracle 9i Release 1
* Oracle 10g
The vulnerability can be exploited by any valid database user able to
execute SQL commands via SQL Plus. The buffer overflow can then be
exploited by calling the SYS_CONTEXT() function. As with all buffer
overflows the cause for the vulnerability is either no bounds checking or
a degenerate case leading to an overwrite of the buffer due to a
programming error when performing bounds checking.
Patch Availability:
Please see MetaLink Document ID 281189.1 for the patch download procedures
and for the Patch Availability Matrix for this Oracle Security Alert which
can be found at:
<http://metalink.oracle.com/metalink/plsql/ml2_documents.showDocument?p_database_id=NOT&p_id=281189.1> http://metalink.oracle.com/metalink/plsql/ml2_documents.showDocument?p_database_id=NOT&p_id=281189.1
Disclosure Timeline
2 September 2003 Oracle was informed
2 September 2003 Bug confirmed
31 August 2004 Oracle published alert 68
ADDITIONAL INFORMATION
The information has been provided by
<mailto:[email protected]> Kornbrust, Alexander - Red Database
Security.
The original article can be found at:
<http://www.red-database-security.com/advisory/advisory_20040903_2.htm>
http://www.red-database-security.com/advisory/advisory_20040903_2.htm
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: [email protected]
In order to subscribe to the mailing list, simply forward this email to: [email protected]
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.