DB: Oracle Database Server Network Authentication AUTH_SESSKEY Buffer Overflow

This signature detects attempts to exploit a known buffer overflow vulnerability in Oracle Database server. It is due to a insufficient validation on the length field of the AUTH_SESSKEY parameter. Remote unauthenticated attackers can exploit this by sending malicious packets to the target server. A successful attack can allow for arbitrary code injection and execution with the SYSTEM privileges.

Extended Description

Oracle Network Authentication is prone to a remote buffer-overflow vulnerability. The vulnerability can be exploited over the 'Oracle Net' protocol. An attacker doesn't need specific privileges to exploit this vulnerability. Oracle Database 10g versions 10.1.0.5 and 10.2.0.4.

Affected Products

Oracle oracle10g_enterprise_edition

References

BugTraq: 36747

CVE: CVE-2009-1979

Short Name
DB:ORACLE:TNS:AUTH-SESSKEY
Severity
Major
Recommended
False
Recommended Action
None
Category
DB
Keywords
AUTH_SESSKEY Authentication Buffer CVE-2009-1979 Database Network Oracle Overflow Server bid:36747
Release Date
10/13/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Frequently
Vendors

Oracle

CVSS Score

10.0

Found a potential security threat?