Full Disclosure mailing list archives
Oracle9i Database Multiple Buffer Overflow Vulnerabilities
From: Olaf Hahn <olaf.hahn () qsc de>
Date: Fri, 06 Feb 2004 12:39:12 +0100
*TITLE:* Oracle9i Database Multiple Buffer Overflow Vulnerabilities *SECUNIA ADVISORY ID:* SA10805 *RELEASE DATE:* 2004-02-06 *VERIFY ADVISORY:* http://www.secunia.com/advisories/10805/ *CRITICAL:* Moderately critical *WHERE:* From local network *IMPACT:* Privilege escalation System access *SOFTWARE:* Oracle9i Database Enterprise Edition Oracle9i Database Standard Edition *DESCRIPTION:*Cesar Cerrudo and Mark Litchfield have discovered multiple vulnerabilities in Oracle9i Database, which can be exploited by malicious database users to compromise the system and gain escalated privileges.
The first vulnerabilities are caused due to boundary errors in two functions used for interval conversion ("NUMTOYMINTERVAL" and "NUMTODSINTERVAL"). These can be exploited to cause buffer overflows by supplying an overly long "char_expr" string.
These two vulnerabilities have been reported in versions prior to 9.2.0.4 (Patchset 3).
The last two vulnerabilities are caused due to boundary errors in the "FROM_TZ" function and in the "TIME_ZONE" parameter.
Both vulnerabilities reportedly affect versions prior to 9.2.0.3.Successful exploitation of the vulnerabilities may allow a malicious, unprivileged database user to execute arbitrary code with either SYSTEM or ORACLE privileges.
*SOLUTION:*Update to version 9.2.0.4 and apply Patch 3, which reportedly is available via the Metalink site:
http://metalink.oracle.com/ *REPORTED BY CREDITS:* Cesar Cerrudo Mark Litchfield, NGSSoftware. *ORIGINAL ADVISORY:* NGSSoftware: Oracle NUMTOYMINTERVAL Remote System Overflow http://www.nextgenss.com/advisories/ora_numtoyminterval.txt NGSSoftware: Oracle NUMTODSINTERVAL Remote System Overflow http://www.nextgenss.com/advisories/ora_numtodsinterval.txt NGSSoftware: Oracle TIME_ZONE Remote System Buffer Overrun http://www.nextgenss.com/advisories/ora_time_zone.txt NGSSoftware: Oracle FROM_TZ Remote System Buffer Overrun http://www.nextgenss.com/advisories/ora_from_tz.txt --Mit freundlichen Grüssen Olaf Hahn Datennetzdienste/Security QSC AG Mathias-Brüggen-Str. 55 50829 Köln Phone: +49 221 6698-443 Fax: +49 221 6698-409 E-Mail: olaf.hahn () qsc de
Internet: http://www.qsc.de ************************************Paranoid zu sein heisst nicht, dass nicht doch jemand hinter einem steht
************************************ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Oracle9i Database Multiple Buffer Overflow Vulnerabilities Olaf Hahn (Feb 06)