exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

oracle-10gR1.txt

oracle-10gR1.txt
Posted Apr 28, 2006
Authored by Argeniss - Information Security | Site argeniss.com

Oracle Database 10gR1 suffers from a buffer overflow in VERIFY_LOG procedure (DB03) Oracle Database Server provides the DBMS_SNAPSHOT_UTL package that includes capability to manage materialized views. This package contains the public procedure VERIFY_LOG that is vulnerable to buffer overflow. By default DBMS_SNAPSHOT_UTL has EXECUTE permission to PUBLIC so any Oracle database user can exploit this vulnerability.

tags | advisory, overflow
SHA-256 | ea6e241657c9e065a438b5455bcab515b2160933d8125c649d1b3edd73b8d8f6

oracle-10gR1.txt

Change Mirror Download
Argeniss Security Advisory


Name: Oracle Database 10gR1 Buffer overflow in
VERIFY_LOG procedure (DB03)
Affected Software: Oracle Database Server version
10gR1
Severity: High
Remote exploitable: Yes (Authentication to Database
Server is needed)
Credits: Esteban Martínez Fayó
Date: 4/18/2006
Advisory Number: ARG040603


Details:
Oracle Database Server provides the DBMS_SNAPSHOT_UTL
package that includes capability to manage
materialized views.
This package contains the public procedure VERIFY_LOG
that is vulnerable to buffer overflow.

By default DBMS_SNAPSHOT_UTL has EXECUTE permission to
PUBLIC so any Oracle database user can exploit this
vulnerability.
Exploitation of this vulnerability allows an attacker
to execute arbitrary code. It can also be exploited to
cause DoS (Denial of Service) killing Oracle server
process.


Vendor Status:
Vendor was contacted and a Critical Patch Update was
released.


Workaround:
Restrict access to the DBMS_SNAPSHOT_UTL package (See
Links section).


Patch Available:
Although this security bug is addressed in the
Critical Patch Update April 2006, for most of the
affected platforms there are no patches available at
this moment.
Oracle informed that the missing patches would be
available on 01-May-06 !!!!


Links:
http://www.argeniss.com/research/ARGENISS-ADV-040603.txt
http://www.argeniss.com/research/Workaround-ADV-040603.sql
http://www.oracle.com/technology/deploy/security/pdf/cpuapr2006.html


Spam:
Searching for Oracle 0days?
Argeniss Ultimate 0day Exploits Pack
http://www.argeniss.com/products.html


Argeniss - Information Security
*Application Security Experts*
http://www.argeniss.com



__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close