Oracle DATAFILE Parameter Overflow

2004-08-31T19:04:59
ID OSVDB:9885
Type osvdb
Reporter Cesar Cerrudo(info@appsecinc.com)
Modified 2004-08-31T19:04:59

Description

Vulnerability Description

A remote overflow exists in Oracle Database Server. The server fails to properly sanitize user input supplied to the DATAFILE parameter resulting in a buffer overflow. With a specially crafted request, an attacker can cause the execution of arbitrary code or crash the server resulting in a loss of integrity or availability.

Solution Description

Currently, there are no known workarounds or upgrades to correct this issue. However, Oracle has released a patch (9ir2 Patchset 4 (9.2.0.5) patch 2) to address this vulnerability.

Short Description

A remote overflow exists in Oracle Database Server. The server fails to properly sanitize user input supplied to the DATAFILE parameter resulting in a buffer overflow. With a specially crafted request, an attacker can cause the execution of arbitrary code or crash the server resulting in a loss of integrity or availability.

References:

Vendor URL: http://www.oracle.com/ Vendor Specific Advisory URL US-CERT Cyber Security Alert: TA04-245A Secunia Advisory ID:12409 Other Advisory URL: http://www.appsecinc.com/resources/alerts/oracle/2004-0001/21.html Other Advisory URL: http://www.appsecinc.com/resources/alerts/oracle/2004-0001/ Mail List Post: http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0041.html Keyword: AppSec Issue 21 Generic Informational URL: http://www.computerworld.com/securitytopics/security/story/0,10801,95013,00.html CIAC Advisory: o-209 Bugtraq ID: 10871