Overview
Oracle9i Database contains a buffer overflow in the TIME_ZONE session parameter which could allow anyone who can query the server to execute arbitrary code or access data with the privileges of the vulnerable process.
Description
The TIME_ZONE parameter is a session parameter that specifies the local time zone displacement for the current SQL session. A buffer overflow exists in the TIME_ZONE parameter. By supplying an overly long character string to the function, an attacker could overwrite a return address on the stack, resulting in the ability to execute arbitrary code or access data with the privileges of the vulnerable process. Oracle typically runs as SYSTEM on Windows and as the ORACLE user on UNIX. |
Impact
Exploitation may result in the ability to execute arbitrary code or access data with the privileges of the vulnerable process. |
Solution
Apply Patch According to NGSSoftware, this problem is fixed in Oracle 9i Database Release 2, version 9.2.0.3. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported by NGSSoftware.
This document was written by Damon Morda.
Other Information
CVE IDs: | None |
Severity Metric: | 13.47 |
Date Public: | 2004-02-06 |
Date First Published: | 2004-02-27 |
Date Last Updated: | 2004-02-27 15:15 UTC |
Document Revision: | 11 |