CERTA-2004-AVI-030

Vulnerability from certfr_avis - Published: - Updated:

Plusieurs vulnérabilités découvertes dans Oracle9i Database permettent à un utilisateur local de réaliser une élévation de privilèges (les privilèges System pour Windows ou Oracle pour Unix).

Description

Une faille de type débordement de mémoire présente sur la variable char_expr dans les deux fonctions de conversion NUMTOYMINTERVAL et NUMTODSINTERVAL permet à un utilisateur mal intentionné d'exécuter du code arbitraire sur système.

Deux autres débordements de mémoire sont présents sur les paramètres TZD (Time Zone Difference) de la fonction FROM_TZ et TIME_ZONE.

Solution

Mettre à jour Oracle9i Database avec la version Oracle9i Database Release 2, version 9.2.0.3 ou la version 9.2.0.4 en appliquant le patch 3 (cf site Metlalink Oracle, section documentation).

None
Impacted products
Vendor Product Description
N/A N/A Oracle9i Database Standard Edition v9.2.0.3.
N/A N/A Oracle9i Database Enterprise Edition v9.2.0.3 ;

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Oracle9i Database Standard Edition v9.2.0.3.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle9i Database Enterprise Edition v9.2.0.3 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nUne faille de type d\u00e9bordement de m\u00e9moire pr\u00e9sente sur la variable\nchar_expr dans les deux fonctions de conversion NUMTOYMINTERVAL et\nNUMTODSINTERVAL permet \u00e0 un utilisateur mal intentionn\u00e9 d\u0027ex\u00e9cuter du\ncode arbitraire sur syst\u00e8me.\n\nDeux autres d\u00e9bordements de m\u00e9moire sont pr\u00e9sents sur les param\u00e8tres TZD\n(Time Zone Difference) de la fonction FROM_TZ et TIME_ZONE.\n\n## Solution\n\nMettre \u00e0 jour Oracle9i Database avec la version Oracle9i Database\nRelease 2, version 9.2.0.3 ou la version 9.2.0.4 en appliquant le patch\n3 (cf site Metlalink Oracle, section documentation).\n",
  "cves": [],
  "links": [
    {
      "title": "NGSSoftware : Oracle NUMTOYMINTERVAL Remote System Overflow    :",
      "url": "http://www.nextgenss.com/advisories/ora_numtoyminterval.txt"
    },
    {
      "title": "NGSSoftware : Oracle FROM_TZ Remote System Overrun :",
      "url": "http://www.nextgenss.com/advisories/ora_from_tz.txt"
    },
    {
      "title": "NGSSoftware : Oracle TIME_ZONE Remote System Overrun :",
      "url": "http://www.nextgenss.com/advisories/ora_time_zone.txt"
    },
    {
      "title": "NGSSoftware : Oracle NUMTODSINTERVAL Remote System Overflow    :",
      "url": "http://www.nextgenss.com/advisories/ora_numtodsinterval.txt"
    },
    {
      "title": "Site Metalink d\u0027Oracle :",
      "url": "http://metalink.oracle.com"
    }
  ],
  "reference": "CERTA-2004-AVI-030",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2004-02-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans Oracle9i Database permettent \u00e0\nun utilisateur local de r\u00e9aliser une \u00e9l\u00e9vation de privil\u00e8ges (les\nprivil\u00e8ges System pour Windows ou Oracle pour Unix).\n",
  "title": "Vuln\u00e9rabilit\u00e9s sur Oracle9i Database",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Avis de s\u00e9curit\u00e9 NGSSoftware",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…