Oracle Interval Conversion Functions Overflow

2004-08-31T18:58:27
ID OSVDB:9891
Type osvdb
Reporter Cesar Cerrudo(info@appsecinc.com)
Modified 2004-08-31T18:58:27

Description

Vulnerability Description

A remote overflow exists in Oracle Database Server. The server fails to properly sanitize user input supplied to the second parameter of the interval conversion functions resulting in a buffer overflow. With a specially crafted request, an attacker can cause the execution of arbitrary code or crash the server resulting in a loss of integrity or availability.

Technical Description

A valid database account with any privileges is required to exploit this.

Solution Description

Currently, there are no known workarounds or upgrades to correct this issue. However, Oracle has released a patch (9ir2 Patchset 3 (9.2.0.4) Patch 3) to address this vulnerability.

Short Description

A remote overflow exists in Oracle Database Server. The server fails to properly sanitize user input supplied to the second parameter of the interval conversion functions resulting in a buffer overflow. With a specially crafted request, an attacker can cause the execution of arbitrary code or crash the server resulting in a loss of integrity or availability.

References:

Vendor URL: http://www.oracle.com/ Vendor Specific Advisory URL US-CERT Cyber Security Alert: TA04-245A Secunia Advisory ID:12409 Other Advisory URL: http://www.appsecinc.com/resources/alerts/oracle/2004-0001/17.html Other Advisory URL: http://www.appsecinc.com/resources/alerts/oracle/2004-0001/ Other Advisory URL: http://www.appsecinc.com/resources/alerts/oracle/2004-0001/13.html Mail List Post: http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0041.html Keyword: AppSec Issue 17 Keyword: AppSec Issue 13 Generic Informational URL: http://www.computerworld.com/securitytopics/security/story/0,10801,95013,00.html CIAC Advisory: o-209 Bugtraq ID: 10871