File: 2701.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (64 lines) | stat: -rw-r--r-- 1,401 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
Rule: 

--
Sid: 
2701

-- 
Summary: 
This event is generated when an attempt is made to exploit a known
vulnerability in an Oracle database server.

-- 
Impact: 
Serious. Possible execution of arbitrary code and Denial of Service.

--
Detailed Information:
This event is generated when an attempt is made to exploit a known
vulnerability in an Oracle database implementation. Multiple buffer
overflow conditions are present in numerous packages and procedures.

Exploitation of these vulnerable procedures may allow an attacker to
execute code of their choosing as the user running the database. In the
case of databases running on Microsoft Windows platforms, this is the
Local System account which may mean a compromise of the operating system
as well as the database.

--
Affected Systems:
	Oracle iSQLPlus

--
Attack Scenarios: 
If an attacker can supply enough data to the procedure in question, it
may be possible to cause the overflow condition to occur and present the
attacker with the opportunity to execute code of their choosing.

-- 
Ease of Attack: 
Simple.

-- 
False Positives:
None Known

--
False Negatives:
None Known

-- 
Corrective Action: 
Apply the appropriate vendor supplied patch

--
Contributors: 
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Alex Kirk <alex.kirk@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:

--