13th Jun 2002 [SBWID-5427]
COMMAND
Oracle TNS Listener buffer overflow
SYSTEMS AFFECTED
Windows and VM running all versions of Oracle 9i Database
PROBLEM
In NGSSoftware Insight Security Research Advisory
[http://www.ngssoftware.com/]:
The Oracle Net Listener contains a remotely exploitable buffer overrun
vulnerability that can allow an attacker to gain complete control of a
machine running the Oracle 9i Database.
The Listener \'listens\' on TCP port 1521 for client request to use the
database. On receiving a request the client is passed off to an
instance of the database. The request, packaged in a valid TNS packet
is of the form
(DESCRIPTION=(ADDRESS=
(PROTOCOL=TCP)(HOST=x.x.x.x)
(PORT=1521))(CONNECT_DATA=
(SERVICE_NAME=myorcl.ngssoftware.com)
(CID=
(PROGRAM=X:\\\\ORACLE\\\\iSuites\\\\BIN\\\\SQLPLUSW.EXE)
(HOST=foo)(USER=bar))))
By supplying an overly long SERVICE_NAME parameter, when forming an
error message to be written to the log file, a saved return address on
the stack is overwritten thus gaining control over the processes
execution. Any code supplied by the attacker will run, by default, in
the context of the Local SYSTEM account on Windows platforms and as
such is a high risk vulnerability. Because the overflow occurs before
the error message is actually written to the log file it may be
difficult to detect if an attack has occured. Customers are advised to
patch this as soon as is possible.
SOLUTION
Oracle have now released patches which are available from the Metalink
site. The patch number is 2367681.
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH