Buffer overflow in ORACLE.EXE for Oracle Database Server 9i, 8i, 8.1.7, and 8.0.6 allows remote attackers to execute arbitrary code via a long username that is provided during login, as exploitable through client applications that perform their own authentication, as demonstrated using LOADPSP.
References
Link | Resource |
---|---|
http://otn.oracle.com/deploy/security/pdf/2003alert51.pdf | Patch Vendor Advisory |
http://www.cert.org/advisories/CA-2003-05.html | Third Party Advisory US Government Resource |
http://www.iss.net/security_center/static/11328.php | Vendor Advisory |
http://www.kb.cert.org/vuls/id/953746 | US Government Resource |
http://www.ciac.org/ciac/bulletins/n-046.shtml | |
http://www.securityfocus.com/bid/6849 | |
http://www.osvdb.org/6319 | |
http://marc.info/?l=bugtraq&m=104549693426042&w=2 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2003-03-02 21:00
Updated : 2016-10-17 19:29
NVD link : CVE-2003-0095
Mitre link : CVE-2003-0095
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
oracle
- oracle8i
- oracle9i
- database_server