Buffer overflow in extproc in Oracle 10g allows remote attackers to execute arbitrary code via environment variables in the library name, which are expanded after the length check is performed.
References
Link | Resource |
---|---|
http://www.ngssoftware.com/advisories/oracle23122004.txt | Patch Vendor Advisory |
http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf | Patch Vendor Advisory |
http://www.us-cert.gov/cas/techalerts/TA04-245A.html | Patch Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/10871 | Patch |
http://www.kb.cert.org/vuls/id/316206 | US Government Resource |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1 | |
http://marc.info/?l=bugtraq&m=110382345829397&w=2 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18659 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2004-08-03 21:00
Updated : 2017-07-10 18:30
NVD link : CVE-2004-1363
Mitre link : CVE-2004-1363
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
oracle
- application_server
- oracle10g
- e-business_suite
- collaboration_suite
- oracle8i
- enterprise_manager
- oracle9i
- enterprise_manager_database_control
- enterprise_manager_grid_control