File: 2609.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (73 lines) | stat: -rw-r--r-- 1,621 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
Rule:

--
Sid:
2609

--
Summary:
This event is generated when an attempt is made to exploit a known
vulnerability in a Oracle database implementation.

--
Impact:
Serious. Execution of arbitrary code may be possible. A Denial of
Service (DoS) condition may also be caused.

--
Detailed Information:
Oracle databases may use a built-in procedure to assist in database
replication. The "cancel_statistics" procedure contains a
programming error that may allow an attacker to execute a buffer
overflow attack.

This overflow is triggered by long strings in some parameters for the
procedure.

If you are running Oracle on a Windows server, make sure that the
variable $ORACLE_PORTS is set to a value of "any".

--
Affected Systems:
        Oracle 9i

--
Attack Scenarios:
An attacker can supply a long string to either the "sname" or
"oname" variables to cause the overflow. The result could
permit the attacker to gain escalated privileges and run code of their
choosing. This attack requires an attacker to logon to the database
with a valid username and password combination.

--
Ease of Attack:
Simple.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Ensure the system is using an up to date version of the software and has
had all vendor supplied patches applied.

--
Contributors:
Sourcefire Vulnerability Research Team
Matt Watchinski <mwatchinski@sourcefire.com>
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>
Judy Novak <judy.novak@sourcefire.com>

--
Additional References:

Other:
http://www.appsecinc.com/Policy/PolicyCheck633.html

--