[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Full-Disclosure] Buffer Overflow in DBMS_SYSTEM.KSDWRT() in Oracle8i - 9i



<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"><HTML 
DIR=ltr><HEAD><META HTTP-EQUIV="Content-Type" CONTENT="text/html; 
charset=iso-8859-1"></HEAD><BODY><DIV><FONT face='Arial' color=#000000 size=2>
<DIV><FONT face=Arial color=#000000 size=2>
<DIV><FONT face=Arial color=#000000 size=2><A 
href="http://www.red-database-security.com/advisory/advisory_20040903_3.htm";>http://www.red-database-security.com/advisory/advisory_20040903_3.htm</A></FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial color=#000000 
size=2>###############################################################</FONT></DIV>
<DIV>RDS_20040903_2 - Red-Database-Security GmbH Research Advisory </DIV>
<DIV><BR>Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 
Buffer Overflow in DBMS_SYSTEM.KSDWRT() in Oracle8i - 9i<BR>Systems 
Affected&nbsp;&nbsp; Oracle 8i - Oracle9i (all 
platforms)<BR>Severity&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 
&nbsp;Medium 
Risk<BR>Category&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 
Buffer Overflow/Denial of Service (Database Crash)<BR>Vendor 
URL&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<A 
href="http://www.oracle.com";>http://www.oracle.com</A><BR>Author&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 
Alexander Kornbrust (ak at 
red-database-security.com)<BR>Date&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 
&nbsp;&nbsp; 3 Sep 2004&nbsp; (V 1.0)<BR>Advisory number&nbsp;&nbsp;&nbsp; 
&nbsp;RDS_200400903_3</DIV>
<DIV>&nbsp;</DIV>
<DIV>Description<BR>###########<BR>Buffer Overflow in DBMS_SYSTEM.KSDWRT() in 
Oracle8i - 9i.</DIV>
<DIV>&nbsp;</DIV>
<DIV>Details<BR>#######<BR>An Oracle user with the permission to execute the 
dbms_system package can crash <BR>the entire database by using a specially 
crafted parameter for the function KSDWRT().&nbsp; <BR>By default only DBA 
users 
have access to this package. </DIV>
<DIV>It is possible sometimes for application developers or the application 
itself to <BR>have access to this package for writing messages into the 
alert.log. </DIV>
<DIV>(Details how to use this package are published on OTN. <BR><A 
href="http://otn.oracle.com/oramag/code/tips2003/011203.html";>http://otn.oracle.com/oramag/code/tips2003/011203.html</A>)</DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;</DIV>
<DIV>Workarounds<BR>###########<BR>Revoke grants from dbms_system. </DIV>
<DIV>&nbsp;</DIV>
<DIV><BR>Patch Information<BR>#################<BR>Please see MetaLink Document 
ID 281189.1 for the patch download procedures <BR>and for the Patch 
Availability 
Matrix for this Oracle Security Alert.</DIV>
<DIV><A 
href="http://metalink.oracle.com/metalink/plsql/ml2_documents.showDocument?p_database_id=NOT&amp;p_id=281189.1";>http://metalink.oracle.com/metalink/plsql/ml2_documents.showDocument?p_database_id=NOT&amp;p_id=281189.1</A></DIV>
<DIV>&nbsp;</DIV>
<DIV>History:<BR>########<BR>24 July 
2003&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Oracle was informed <BR>24 
July 2003&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Bug confirmed<BR>31 
August 2004&nbsp;&nbsp;&nbsp; Oracle published alert 68</DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;</DIV>
<DIV><BR>About Red-Database-Security 
GmbH<BR>#################################<BR>Red-Database-Security GmbH is a 
specialist in Oracle Security. </DIV>
<DIV><BR><A 
href="http://www.red-database-security.com/";>http://www.red-database-security.com/</A></DIV>
<DIV><BR>&nbsp;</DIV></FONT></DIV></FONT></DIV></BODY></HTML>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html