[NEWS] Oracle SYS_CONTEXT Procedure Buffer Overflow Vulnerability

From: SecuriTeam (support_at_securiteam.com)
Date: 09/12/04

  • Next message: SecuriTeam: "[UNIX] PHP-Nuke XSS Vulnerabilities Through AddMsg And Newsletter Features"
    To: list@securiteam.com
    Date: 12 Sep 2004 14:16:05 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.
    http://www.securiteam.com/mailinglist.html

    - - - - - - - - -

      Oracle SYS_CONTEXT Procedure Buffer Overflow Vulnerability
    ------------------------------------------------------------------------

    SUMMARY

    A buffer overflow vulnerability was found in the SYS_CONTEXT procedure in
    Oracle Database Server allowing a valid database user to execute arbitrary
    code.

    DETAILS

    Vulnerable Systems:
     * Oracle 9i Release 2 versions 9.2.0.0 up to and including 9.2.0.4
    (Windows platform only)

    Immune Systems:
     * Oracle 9i Release 1
     * Oracle 10g

    The vulnerability can be exploited by any valid database user able to
    execute SQL commands via SQL Plus. The buffer overflow can then be
    exploited by calling the SYS_CONTEXT() function. As with all buffer
    overflows the cause for the vulnerability is either no bounds checking or
    a degenerate case leading to an overwrite of the buffer due to a
    programming error when performing bounds checking.

    Patch Availability:
    Please see MetaLink Document ID 281189.1 for the patch download procedures
    and for the Patch Availability Matrix for this Oracle Security Alert which
    can be found at:
     
    <http://metalink.oracle.com/metalink/plsql/ml2_documents.showDocument?p_database_id=NOT&p_id=281189.1> http://metalink.oracle.com/metalink/plsql/ml2_documents.showDocument?p_database_id=NOT&p_id=281189.1

    Disclosure Timeline
    2 September 2003 Oracle was informed
    2 September 2003 Bug confirmed
    31 August 2004 Oracle published alert 68

    ADDITIONAL INFORMATION

    The information has been provided by
    <mailto:ak@red-database-security.com> Kornbrust, Alexander - Red Database
    Security.
    The original article can be found at:
    <http://www.red-database-security.com/advisory/advisory_20040903_2.htm>
    http://www.red-database-security.com/advisory/advisory_20040903_2.htm

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[UNIX] PHP-Nuke XSS Vulnerabilities Through AddMsg And Newsletter Features"

    Relevant Pages

    • [UNIX] SCO Multiple Local Buffer Overflow
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Local exploitation of a buffer overflow vulnerability in the ppp binary, ... allows attackers to gain root privileges. ...
      (Securiteam)
    • [NT] Lhaplus LHA Extended Header Handling Buffer Overflow
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Lhaplus LHA Extended Header Handling Buffer Overflow ... A vulnerability has been found in Lhaplus. ... This advisory discloses a buffer overflow vulnerability in Lhaplus. ...
      (Securiteam)
    • [NEWS] 0verkill Buffer Overflow Vulnerabilities
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... $HOME environment variable demonstrates the buffer overflow, ... GNU gdb 5.0 ... vulnerability or to otherwise crash the program. ...
      (Securiteam)
    • [UNIX] Sun Microsystems Solaris ld.so doprf() Buffer Overflow Vulnerability
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Sun Microsystems Solaris ld.so 'doprf' Buffer Overflow Vulnerability ...
      (Securiteam)
    • [UNIX] Oracle Database Local Untrusted Library Path Vulnerability
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Oracle Database Local Untrusted Library Path Vulnerability ...
      (Securiteam)