[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Full-Disclosure] Buffer Overflow in SYS_CONTEXT() in Oracle 9i Rel.2



<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"><HTML 
DIR=ltr><HEAD><META HTTP-EQUIV="Content-Type" CONTENT="text/html; 
charset=iso-8859-1"></HEAD><BODY>
<DIV><FONT face=Arial color=#000000 size=2>
<DIV><FONT face=Arial color=#000000 size=2>
<DIV><FONT face=Arial color=#000000 size=2><A 
href="http://www.red-database-security.com/advisory/advisory_20040903_2.htm";>http://www.red-database-security.com/advisory/advisory_20040903_2.htm</A></FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial color=#000000 
size=2>###############################################################</FONT></DIV></FONT></DIV>
<DIV><FONT face=Arial color=#000000 size=2>RDS_20040903_2 - 
Red-Database-Security GmbH Research Advisory </FONT></DIV><FONT face=Arial 
color=#000000 size=2>
<DIV><BR>Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 
Buffer Overflow in SYS_CONTEXT() in Oracle 9i Rel.2<BR>Systems 
Affected&nbsp;&nbsp; Oracle9i Rel. 2 (Windows platform 
only)<BR>Severity&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 
Medium 
Risk<BR>Category&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 
Buffer Overflow<BR>Vendor 
URL&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<A 
href="http://www.oracle.com";>http://www.oracle.com</A><BR>Author&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 
Alexander Kornbrust (ak at 
red-database-security.com)<BR>Date&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 
3 Sep 2004&nbsp; (V 1.0)<BR>Advisory number&nbsp;&nbsp;&nbsp; 
RDS_200400903_2</DIV>
<DIV>&nbsp;</DIV>
<DIV>Description<BR>###########<BR>Buffer Overflow in SYS_CONTEXT() in Oracle 
9i 
Rel.2.</DIV>
<DIV>&nbsp;</DIV>
<DIV>Details<BR>#######<BR>Any valid database user with the possibility to run 
SQL commands (e.g. via SQL*Plus), <BR>can create a buffer overflow by abusing 
the SYS_CONTEXT()-function. <BR>This vulnerability affects only the windows 
versions of Oracle 9i Rel. 2 (9.2.0.0 - 9.2.0.4). </DIV>
<DIV>Oracle 9i Rel. 1 or Oracle 10g are NOT affected.</DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;</DIV>
<DIV>Workarounds<BR>###########<BR>No workarounds available.</DIV>
<DIV>&nbsp;</DIV>
<DIV><BR>Patch Information<BR>#################<BR>Please see MetaLink Document 
ID 281189.1 for the patch download procedures and for <BR>the Patch 
Availability 
Matrix for this Oracle Security Alert.</DIV>
<DIV><A 
href="http://metalink.oracle.com/metalink/plsql/ml2_documents.showDocument?p_database_id=NOT&amp;p_id=281189.1";>http://metalink.oracle.com/metalink/plsql/ml2_documents.showDocument?p_database_id=NOT&amp;p_id=281189.1</A></DIV>
<DIV>&nbsp;</DIV>
<DIV>History:<BR>########<BR>2 September 2003&nbsp; Oracle was informed <BR>2 
September 2003&nbsp; Bug confirmed<BR>31 August 
2004&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Oracle published alert 68</DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;</DIV>
<DIV>About Red-Database-Security 
GmbH<BR>#################################<BR>Red-Database-Security GmbH is a 
specialist in Oracle Security. </DIV>
<DIV><BR><A 
href="http://www.red-database-security.com/";>http://www.red-database-security.com/</A></DIV>
<DIV><BR></FONT><FONT face="Times New Roman" 
size=3>&nbsp;</FONT></DIV></FONT></DIV><DIV><FONT face='Arial' color=#000000 
size=2></FONT>&nbsp;</DIV></BODY></HTML>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html