DB: Oracle Database Server Network Authentication AUTH_SESSKEY Buffer Overflow
This signature detects attempts to exploit a known buffer overflow vulnerability in Oracle Database server. It is due to a insufficient validation on the length field of the AUTH_SESSKEY parameter. Remote unauthenticated attackers can exploit this by sending malicious packets to the target server. A successful attack can allow for arbitrary code injection and execution with the SYSTEM privileges.
Extended Description
Oracle Network Authentication is prone to a remote buffer-overflow vulnerability. The vulnerability can be exploited over the 'Oracle Net' protocol. An attacker doesn't need specific privileges to exploit this vulnerability. Oracle Database 10g versions 10.1.0.5 and 10.2.0.4.
Affected Products
Oracle oracle10g_enterprise_edition
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Oracle
10.0