The Oracle Database Server Security Component contains a buffer overflow. Exploitation may allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.
A lack of input validation in the Oracle Database Server Security Component may allow a buffer overflow to occur. The specific details of conditions necessary to cause the buffer overflow are unavailable. However, the Oracle Critical Patch Update for October 2005 suggests this issue is remotely exploitable by attackers that have execute privileges on
This issue is identified as DB27 in the Oracle Critical Patch Update for October 2005. Note that exploit code is publicly available for this vulnerability, but we have not verified if this exploit works.
A remote attacker may be able execute arbitrary code or cause a denial-of-service condition.
Apply the appropriate patch or upgrade as specified in the Oracle Critical Patch Update for October 2005.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Vendor has issued information
__ Sort by: Status Alphabetical
Affected Unknown __ Unaffected
Updated: October 21, 2005
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see <http://www.oracle.com/technology/deploy/security/pdf/cpuoct2005.html>.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | | N/A
This document is based on information contained in the Oracle Critical Patch Update for October 2005.
This document was written by Jeff Gennari.
CVE IDs:* | None
**Severity Metric: | 17.51
*Date Public: | 2005-10-18
Date First Published: | 2005-10-21
Date Last Updated: | 2005-10-22 01:44 UTC
Document Revision: | 31