Oracle CTX_OUTPUT Package Function Overflow

2004-08-31T19:00:50
ID OSVDB:9892
Type osvdb
Reporter Cesar Cerrudo(info@appsecinc.com)
Modified 2004-08-31T19:00:50

Description

Vulnerability Description

A remote overflow exists in Oracle Database Server CTX_OUTPUT package. The package fails to properly sanitize user input to a function resulting in a buffer overflow. With a specially crafted request, an attacker can cause the execution of arbitrary code or crash the server resulting in a loss of integrity or availability.

Technical Description

This vulnerability can be exploited by members of Oracle CTXAPP Role, CTXSYS user and users granted execute permissions on CTX_OUTPUT package.

Solution Description

Currently, there are no known workarounds or upgrades to correct this issue. However, Oracle has released a patch (Oracle 9ir2 Patchset 4 (9.2.0.5) patch 2) to address this vulnerability.

Short Description

A remote overflow exists in Oracle Database Server CTX_OUTPUT package. The package fails to properly sanitize user input to a function resulting in a buffer overflow. With a specially crafted request, an attacker can cause the execution of arbitrary code or crash the server resulting in a loss of integrity or availability.

References:

Vendor URL: http://www.oracle.com/ Vendor Specific Advisory URL US-CERT Cyber Security Alert: TA04-245A Secunia Advisory ID:12409 Other Advisory URL: http://www.appsecinc.com/resources/alerts/oracle/2004-0001/ Other Advisory URL: http://www.appsecinc.com/resources/alerts/oracle/2004-0001/19.html Mail List Post: http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0041.html Keyword: AppSec Issue 19 Generic Informational URL: http://www.computerworld.com/securitytopics/security/story/0,10801,95013,00.html CIAC Advisory: o-209 Bugtraq ID: 10871