Oracle DBMS_AQ_IMPORT_INTERNAL Package AQ_TABLE_DEFN_UPDATE Procedure Overflow

2004-08-31T19:08:56
ID OSVDB:9877
Type osvdb
Reporter Esteban Martinez Fayo(info@appsecinc.com)
Modified 2004-08-31T19:08:56

Description

Vulnerability Description

A remote overflow exists in Oracle Database Server DBMS_AQ_IMPORT_INTERNAL package. The package fails to properly sanitize user input to the QT_NAME parameter which is passed to the AQ_TABLE_DEFN_UPDATE procedure resulting in a buffer overflow. With a specially crafted request, an attacker can cause the execution of arbitrary code or crash the server resulting in a loss of integrity or availability.

Technical Description

This requires EXECUTE_CATALOG_ROLE, EXP_FULL_DATABASE, EXP_FULL_DATABASE, AQ_ADMINISTRATOR_ROLE, or SYSDBA role access with execute permissions on the DBMS_AQ_IMPORT_INTERNAL package.

Solution Description

Currently, there are no known workarounds or upgrades to correct this issue. However, Oracle has released a patch (Patchset 4 (9.2.0.5)) to address this vulnerability.

Short Description

A remote overflow exists in Oracle Database Server DBMS_AQ_IMPORT_INTERNAL package. The package fails to properly sanitize user input to the QT_NAME parameter which is passed to the AQ_TABLE_DEFN_UPDATE procedure resulting in a buffer overflow. With a specially crafted request, an attacker can cause the execution of arbitrary code or crash the server resulting in a loss of integrity or availability.

References:

Vendor URL: http://www.oracle.com/ Vendor Specific Advisory URL US-CERT Cyber Security Alert: TA04-245A Secunia Advisory ID:12409 Other Advisory URL: http://www.appsecinc.com/resources/alerts/oracle/2004-0001/ Other Advisory URL: http://www.appsecinc.com/resources/alerts/oracle/2004-0001/27.html Mail List Post: http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0041.html Keyword: AppSec Issue 27 Generic Informational URL: http://www.computerworld.com/securitytopics/security/story/0,10801,95013,00.html CIAC Advisory: o-209 Bugtraq ID: 10871