Overview
The Oracle Database Server Security Component contains a buffer overflow. Exploitation may allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.
Description
A lack of input validation in the Oracle Database Server Security Component may allow a buffer overflow to occur. The specific details of conditions necessary to cause the buffer overflow are unavailable. However, the Oracle Critical Patch Update for October 2005 suggests this issue is remotely exploitable by attackers that have execute privileges on sys.pbsde. This issue is identified as DB27 in the Oracle Critical Patch Update for October 2005. Note that exploit code is publicly available for this vulnerability, but we have not verified if this exploit works. |
Impact
A remote attacker may be able execute arbitrary code or cause a denial-of-service condition. |
Solution
Apply updates Apply the appropriate patch or upgrade as specified in the Oracle Critical Patch Update for October 2005. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 0 | AV:--/AC:--/Au:--/C:--/I:--/A:-- |
Temporal | 0 | E:ND/RL:ND/RC:ND |
Environmental | 0 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
This document is based on information contained in the Oracle Critical Patch Update for October 2005.
This document was written by Jeff Gennari.
Other Information
CVE IDs: | None |
Severity Metric: | 17.51 |
Date Public: | 2005-10-18 |
Date First Published: | 2005-10-21 |
Date Last Updated: | 2005-10-22 01:44 UTC |
Document Revision: | 32 |