DB: Oracle Database Server String Conversion Function Buffer Overflow

This signature detects attempts to exploit a known vulnerability in Oracle Database Server. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted server.

Extended Description

Reportedly, multiple unspecified Oracle products contain multiple unspecified vulnerabilities. The reported vulnerabilities include SQL-injection issues, buffer-overflow issues, and others. There have also been reports that issues covered in this BID and resolved in the referenced Oracle patch include trigger-abuse issues, character-set-conversion bugs, and denial-of-service vulnerabilities. More information is pending. Note that a number of unsupported versions of affected products may also potentially be vulnerable.

Affected Products

Oracle oracle9i_lite

References

BugTraq: 10871

CVE: CVE-2004-1364

Short Name
DB:ORACLE:STRCONV-BOF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
DB
Keywords
Buffer CVE-2004-1364 Conversion Database Function Oracle Overflow Server String bid:10871
Release Date
07/01/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3655
False Positive
Unknown
Vendors

Oracle

Sun

CVSS Score

8.5

Found a potential security threat?