Short Name |
DB:ORACLE:TNS:AUTH-SESSKEY |
---|---|
Severity |
Major |
Recommended |
No |
Category |
DB |
Keywords |
Oracle Database Server Network Authentication AUTH_SESSKEY Buffer Overflow |
Release Date |
2010/10/13 |
Update Number |
1791 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known buffer overflow vulnerability in Oracle Database server. It is due to a insufficient validation on the length field of the AUTH_SESSKEY parameter. Remote unauthenticated attackers can exploit this by sending malicious packets to the target server. A successful attack can allow for arbitrary code injection and execution with the SYSTEM privileges.
Oracle Network Authentication is prone to a remote buffer-overflow vulnerability. The vulnerability can be exploited over the 'Oracle Net' protocol. An attacker doesn't need specific privileges to exploit this vulnerability. Oracle Database 10g versions 10.1.0.5 and 10.2.0.4.