Directory traversal vulnerability in extproc in Oracle 9i and 10g allows remote attackers to access arbitrary libraries outside of the $ORACLE_HOME\bin directory.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/18658 | vdb entry |
http://www.securityfocus.com/archive/1/454861/100/0/threaded | mailing list |
http://www.kb.cert.org/vuls/id/316206 | third party advisory us government resource |
http://www.us-cert.gov/cas/techalerts/TA04-245A.html | us government resource third party advisory patch |
http://marc.info/?l=bugtraq&m=110382406002365&w=2 | mailing list |
http://www.securityfocus.com/bid/10871 | vdb entry patch |
http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf | patch vendor advisory |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1 | vendor advisory |
http://www.ngssoftware.com/advisories/oracle23122004B.txt | patch vendor advisory |
http://www.0xdeadbeef.info/exploits/raptor_oraextproc.sql |