Buffer overflow in extproc in Oracle 10g allows remote attackers to execute arbitrary code via environment variables in the library name, which are expanded after the length check is performed.
The product does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer overflow.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/18659 | vdb entry third party advisory |
http://www.ngssoftware.com/advisories/oracle23122004.txt | patch vendor advisory broken link |
http://marc.info/?l=bugtraq&m=110382345829397&w=2 | mailing list |
http://www.kb.cert.org/vuls/id/316206 | third party advisory us government resource |
http://www.us-cert.gov/cas/techalerts/TA04-245A.html | us government resource patch third party advisory broken link |
http://www.securityfocus.com/bid/10871 | patch vdb entry third party advisory broken link |
http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf | patch vendor advisory broken link |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1 | vendor advisory broken link |