DB: Oracle TNSListener SERVICE_NAME Parameter Buffer Overflow
This signature detects attempts to exploit a known vulnerability in the Oracle database TNS Listener. A successful attack can lead to remote arbitrary code execution.
Extended Description
TNSListener is a component of the Oracle database, distributed by Oracle Corporation. A buffer overflow has been reported in the Oracle TNSListener. This buffer overflow may allow a user to remotely execute code on a vulnerable system. This is the result of an error in logging an oversized SERVICE_NAME received as part of a TNS packet. Reportedly, this issue only exists on versions of Oracle 9.0.x for Microsoft Windows and VM. This issue was formerly discussed in BID 4955.
Affected Products
Oracle oracle9i_standard_edition
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Oracle
7.5