what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ora-isqlplus.txt

ora-isqlplus.txt
Posted Nov 19, 2002
Authored by David Litchfield | Site ngssoftware.com

The Oracle iSQL*Plus 91 R1 and R2 web based application has an authentication buffer overflow on all OS's in the User ID parameter which allows remote attackers to execute arbitrary code as the oracle user on Unix and SYSTEM on Windows. Patch available here.

tags | exploit, remote, web, overflow, arbitrary, sql injection
systems | windows, unix
SHA-256 | 1721781c18414d0033b5c54cab225544447998747b4d67107efcbc20286bb7b9

ora-isqlplus.txt

Change Mirror Download
NGSSoftware Insight Security Research Advisory

Name: Oracle iSQL*Plus buffer overflow
Systems: Oracle Database 9i R1,2 on all operating systems
Severity: High Risk
Vendor URL: http://www.oracle.com/
Author: David Litchfield (david@ngssoftware.com)
Advisory URL: http://www.ngssoftware.com/advisories/ora-isqlplus.txt
Date: 4th November 2002
Advisory number: #NISR04112002


Description
***********
Oracle iSQL*Plus is a web based application that allows users to query the
database. It is installed with Oracle 9 database server and runs on top of
apache. The iSQL*Plus module is vulnerable to a classic buffer overflow
vulnerability.


Details
*******
The iSQL*Plus web application requires users to log in. After accessing the
default url, "/isqlplus" a user is presented with a log in screen. By
sending the web server an overly long user ID parameter, an internal buffer
is overflow on the stack and the saved return address is overwritten. This
can allow an attacker to run arbitrary code in the security context of the
web server. On most systems this will be the "oracle" user and on Windows
the "SYSTEM" user. Once the web server has been compromised attackers may
then use it as a staging platform to launch attacks against the database
server itself.

Fix Information
***************
NGSSoftware alerted Oracle to this problem on the 18th of October and
Oracle, last week, issued an alert. The Oracle bug number assigned to this
issue is 2581911. Patches can be downloaded from the Oracle Metalink site
http://metalink.oracle.com/.



Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close