ID CVE-2002-0965
Summary Buffer overflow in TNS Listener for Oracle 9i Database Server on Windows systems, and Oracle 8 on VM, allows local users to execute arbitrary code via a long SERVICE_NAME parameter, which is not properly handled when writing an error message to a log file.
References
Vulnerable Configurations
  • cpe:2.3:a:oracle:oracle9i:9.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:oracle9i:9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:oracle9i:9.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:oracle9i:9.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:oracle9i:9.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:oracle9i:9.0.2:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 05-09-2008 - 20:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 4845
bugtraq 20020612 Oracle TNS Listener Buffer Overflow (#NISR12062002A)
cert-vn VU#630091
confirm http://otn.oracle.com/deploy/security/pdf/net9_dos_alert.pdf
vulnwatch 20020612 [VulnWatch] Oracle TNS Listener Buffer Overflow (#NISR12062002A)
xf oracle-listener-servicename-bo(9288)
Last major update 05-09-2008 - 20:29
Published 04-10-2002 - 04:00
Last modified 05-09-2008 - 20:29
Back to Top