Short Name |
DB:ORACLE:TNS:TABLEFUNC-ASOWN |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
DB |
Keywords |
Oracle Database CTXSYS.DRVDISP.TABLEFUNC_ASOWN Buffer Overflow |
Release Date |
2011/12/14 |
Update Number |
2047 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in the Oracle Database CTXSYS.DRVDISP.TABLEFUNC_ASOWN. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
Oracle Database is prone to a buffer-overflow vulnerability that exists in Oracle Text. The vulnerability can be exploited over the 'Oracle Net' protocol. For an exploit to succeed, the attacker must have 'Execute on CTXSYS.DRVDISP' privileges. Successful exploits will allow attackers to execute arbitrary code in the context of the affected application. This may facilitate a complete system compromise. This vulnerability affects the following supported versions: 10.1.0.5, 10.2.0.3, 10.2.0.4, 11.1.0.7ww