CVE-2003-1208

Multiple buffer overflows in Oracle 9i 9 before 9.2.0.3 allow local users to execute arbitrary code by (1) setting the TIME_ZONE session parameter to a long value, or providing long parameters to the (2) NUMTOYMINTERVAL, (3) NUMTODSINTERVAL or (4) FROM_TZ functions.
References
Link Resource
http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0030.html Exploit Vendor Advisory
http://secunia.com/advisories/10805 Exploit Patch
http://www.ciac.org/ciac/bulletins/o-093.shtml Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/240174 Patch Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/399806 Patch Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/819126 Patch Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/846582 Patch Third Party Advisory US Government Resource
http://www.nextgenss.com/advisories/ora_from_tz.txt Exploit Patch
http://www.nextgenss.com/advisories/ora_numtodsinterval.txt Exploit Patch
http://www.nextgenss.com/advisories/ora_numtoyminterval.txt Exploit Patch
http://www.nextgenss.com/advisories/ora_time_zone.txt Exploit
http://www.osvdb.org/3837 Exploit Patch Vendor Advisory
http://www.osvdb.org/3838 Exploit Patch Vendor Advisory
http://www.osvdb.org/3839 Exploit Patch Vendor Advisory
http://www.osvdb.org/3840 Exploit Patch Vendor Advisory
http://www.securityfocus.com/bid/9587 Exploit Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/15060
http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0030.html Exploit Vendor Advisory
http://secunia.com/advisories/10805 Exploit Patch
http://www.ciac.org/ciac/bulletins/o-093.shtml Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/240174 Patch Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/399806 Patch Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/819126 Patch Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/846582 Patch Third Party Advisory US Government Resource
http://www.nextgenss.com/advisories/ora_from_tz.txt Exploit Patch
http://www.nextgenss.com/advisories/ora_numtodsinterval.txt Exploit Patch
http://www.nextgenss.com/advisories/ora_numtoyminterval.txt Exploit Patch
http://www.nextgenss.com/advisories/ora_time_zone.txt Exploit
http://www.osvdb.org/3837 Exploit Patch Vendor Advisory
http://www.osvdb.org/3838 Exploit Patch Vendor Advisory
http://www.osvdb.org/3839 Exploit Patch Vendor Advisory
http://www.osvdb.org/3840 Exploit Patch Vendor Advisory
http://www.securityfocus.com/bid/9587 Exploit Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/15060
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.2.0.2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:46

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0030.html - Exploit, Vendor Advisory () http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0030.html - Exploit, Vendor Advisory
References () http://secunia.com/advisories/10805 - Exploit, Patch () http://secunia.com/advisories/10805 - Exploit, Patch
References () http://www.ciac.org/ciac/bulletins/o-093.shtml - Patch, Vendor Advisory () http://www.ciac.org/ciac/bulletins/o-093.shtml - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/240174 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/240174 - Patch, Third Party Advisory, US Government Resource
References () http://www.kb.cert.org/vuls/id/399806 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/399806 - Patch, Third Party Advisory, US Government Resource
References () http://www.kb.cert.org/vuls/id/819126 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/819126 - Patch, Third Party Advisory, US Government Resource
References () http://www.kb.cert.org/vuls/id/846582 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/846582 - Patch, Third Party Advisory, US Government Resource
References () http://www.nextgenss.com/advisories/ora_from_tz.txt - Exploit, Patch () http://www.nextgenss.com/advisories/ora_from_tz.txt - Exploit, Patch
References () http://www.nextgenss.com/advisories/ora_numtodsinterval.txt - Exploit, Patch () http://www.nextgenss.com/advisories/ora_numtodsinterval.txt - Exploit, Patch
References () http://www.nextgenss.com/advisories/ora_numtoyminterval.txt - Exploit, Patch () http://www.nextgenss.com/advisories/ora_numtoyminterval.txt - Exploit, Patch
References () http://www.nextgenss.com/advisories/ora_time_zone.txt - Exploit () http://www.nextgenss.com/advisories/ora_time_zone.txt - Exploit
References () http://www.osvdb.org/3837 - Exploit, Patch, Vendor Advisory () http://www.osvdb.org/3837 - Exploit, Patch, Vendor Advisory
References () http://www.osvdb.org/3838 - Exploit, Patch, Vendor Advisory () http://www.osvdb.org/3838 - Exploit, Patch, Vendor Advisory
References () http://www.osvdb.org/3839 - Exploit, Patch, Vendor Advisory () http://www.osvdb.org/3839 - Exploit, Patch, Vendor Advisory
References () http://www.osvdb.org/3840 - Exploit, Patch, Vendor Advisory () http://www.osvdb.org/3840 - Exploit, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/9587 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/9587 - Exploit, Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/15060 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/15060 -

Information

Published : 2004-12-03 05:00

Updated : 2024-11-20 23:46


NVD link : CVE-2003-1208

Mitre link : CVE-2003-1208

CVE.ORG link : CVE-2003-1208


JSON object : View

Products Affected

oracle

  • oracle9i