Directory traversal vulnerability in Oracle Database Server 8i and 9i allows remote attackers to read or rename arbitrary files via "\\.\\.." (modified dot dot backslash) sequences to UTL_FILE functions such as (1) UTL_FILE.FOPEN or (2) UTL_FILE.frename.
References
Link | Resource |
---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032273.html | Exploit Patch Vendor Advisory |
http://marc.info/?l=bugtraq&m=111023635928211&w=2 | |
http://www.argeniss.com/research/ARGENISS-ADV-030501.txt | Exploit Patch Vendor Advisory |
http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032273.html | Exploit Patch Vendor Advisory |
http://marc.info/?l=bugtraq&m=111023635928211&w=2 | |
http://www.argeniss.com/research/ARGENISS-ADV-030501.txt | Exploit Patch Vendor Advisory |
Configurations
History
20 Nov 2024, 23:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032273.html - Exploit, Patch, Vendor Advisory | |
References | () http://marc.info/?l=bugtraq&m=111023635928211&w=2 - | |
References | () http://www.argeniss.com/research/ARGENISS-ADV-030501.txt - Exploit, Patch, Vendor Advisory |
Information
Published : 2005-03-07 05:00
Updated : 2024-11-20 23:55
NVD link : CVE-2005-0701
Mitre link : CVE-2005-0701
CVE.ORG link : CVE-2005-0701
JSON object : View
Products Affected
oracle
- database_server
CWE