Full Disclosure mailing list archives

Oracle9i Database Multiple Buffer Overflow Vulnerabilities


From: Olaf Hahn <olaf.hahn () qsc de>
Date: Fri, 06 Feb 2004 12:39:12 +0100

*TITLE:*
Oracle9i Database Multiple Buffer Overflow Vulnerabilities

*SECUNIA ADVISORY ID:*
SA10805

*RELEASE DATE:*
2004-02-06

*VERIFY ADVISORY:*
http://www.secunia.com/advisories/10805/

*CRITICAL:*
Moderately critical

*WHERE:*
From local network

*IMPACT:*
Privilege escalation
System access

*SOFTWARE:*
Oracle9i Database Enterprise Edition
Oracle9i Database Standard Edition

*DESCRIPTION:*
Cesar Cerrudo and Mark Litchfield have discovered multiple vulnerabilities in Oracle9i Database, which can be exploited by malicious database users to compromise the system and gain escalated privileges.

The first vulnerabilities are caused due to boundary errors in two functions used for interval conversion ("NUMTOYMINTERVAL" and "NUMTODSINTERVAL"). These can be exploited to cause buffer overflows by supplying an overly long "char_expr" string.

These two vulnerabilities have been reported in versions prior to 9.2.0.4 (Patchset 3).

The last two vulnerabilities are caused due to boundary errors in the "FROM_TZ" function and in the "TIME_ZONE" parameter.

Both vulnerabilities reportedly affect versions prior to 9.2.0.3.

Successful exploitation of the vulnerabilities may allow a malicious, unprivileged database user to execute arbitrary code with either SYSTEM or ORACLE privileges.

*SOLUTION:*
Update to version 9.2.0.4 and apply Patch 3, which reportedly is available via the Metalink site:
http://metalink.oracle.com/

*REPORTED BY CREDITS:*
Cesar Cerrudo
Mark Litchfield, NGSSoftware.

*ORIGINAL ADVISORY:*
NGSSoftware: Oracle NUMTOYMINTERVAL Remote System Overflow
http://www.nextgenss.com/advisories/ora_numtoyminterval.txt

NGSSoftware: Oracle NUMTODSINTERVAL Remote System Overflow
http://www.nextgenss.com/advisories/ora_numtodsinterval.txt

NGSSoftware: Oracle TIME_ZONE Remote System Buffer Overrun
http://www.nextgenss.com/advisories/ora_time_zone.txt

NGSSoftware: Oracle FROM_TZ Remote System Buffer Overrun
http://www.nextgenss.com/advisories/ora_from_tz.txt

--


Mit freundlichen Grüssen Olaf Hahn Datennetzdienste/Security QSC AG Mathias-Brüggen-Str. 55 50829 Köln Phone: +49 221 6698-443 Fax: +49 221 6698-409 E-Mail: olaf.hahn () qsc de
Internet: http://www.qsc.de

************************************
Paranoid zu sein heisst nicht, dass nicht doch jemand hinter einem steht
************************************

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: