File: 2611.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (75 lines) | stat: -rw-r--r-- 1,595 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
Rule:

--
Sid:
2611

--
Summary:
This event is generated when an attempt is made to exploit a known
vulnerability in a Oracle database implementation.

--
Impact:
Serious. Execution of arbitrary code may be possible. A Denial of
Service (DoS) condition may also be caused.

--
Detailed Information:

An attacker can create a database link and supply it an overly
long string to the "USING" parameter of the "CREATE DATABASE LINK"
command. This long value is stored for later use. When subsequently
accessed via the link, a buffer overflow can occur.

If you are running Oracle on a Windows server, make sure that the
variable $ORACLE_PORTS is set to a value of "any".

--
Affected Systems:
        Oracle 9i and earlier

--
Attack Scenarios:
An attacker can create a database link and supply it an overly long
"USING" value.  The result could permit the attacker to gain escalated
privileges and run code of their choosing.

--
Ease of Attack:
Simple.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Ensure the system is using an up to date version of the software and has
had all vendor supplied patches applied.

--
Contributors:
Sourcefire Vulnerability Research Team
Matt Watchinski <mwatchinski@sourcefire.com>
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>
Judy Novak <judy.novak@sourcefire.com>

--
Additional References:

CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0222

Bugtraq
http://www.securityfocus.com/bid/7453

Other:
http://archives.neohapsis.com/archives/bugtraq/2003-04/0360.html

--