CVE-2004-1363

Buffer overflow in extproc in Oracle 10g allows remote attackers to execute arbitrary code via environment variables in the library name, which are expanded after the length check is performed.
References
Link Resource
http://marc.info/?l=bugtraq&m=110382345829397&w=2 Mailing List
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1 Broken Link
http://www.kb.cert.org/vuls/id/316206 Third Party Advisory US Government Resource
http://www.ngssoftware.com/advisories/oracle23122004.txt Broken Link Patch Vendor Advisory
http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf Broken Link Patch Vendor Advisory
http://www.securityfocus.com/bid/10871 Broken Link Patch Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA04-245A.html Broken Link Patch Third Party Advisory US Government Resource
https://exchange.xforce.ibmcloud.com/vulnerabilities/18659 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:application_server:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.2.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:collaboration_suite:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:8.1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:9.0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:9.0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:9.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:9.2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:9.2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:10.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.8:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager:9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager:9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_database_control:10.1.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_grid_control:10.1.0.2:*:*:*:*:*:*:*

History

02 Feb 2024, 14:01

Type Values Removed Values Added
CVSS v2 : 7.2
v3 : unknown
v2 : 7.2
v3 : 9.8
References () http://marc.info/?l=bugtraq&m=110382345829397&w=2 - () http://marc.info/?l=bugtraq&m=110382345829397&w=2 - Mailing List
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1 - Broken Link
References () http://www.kb.cert.org/vuls/id/316206 - US Government Resource () http://www.kb.cert.org/vuls/id/316206 - Third Party Advisory, US Government Resource
References () http://www.ngssoftware.com/advisories/oracle23122004.txt - Patch, Vendor Advisory () http://www.ngssoftware.com/advisories/oracle23122004.txt - Broken Link, Patch, Vendor Advisory
References () http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf - Patch, Vendor Advisory () http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf - Broken Link, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/10871 - Patch () http://www.securityfocus.com/bid/10871 - Broken Link, Patch, Third Party Advisory, VDB Entry
References () http://www.us-cert.gov/cas/techalerts/TA04-245A.html - Patch, Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA04-245A.html - Broken Link, Patch, Third Party Advisory, US Government Resource
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/18659 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/18659 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:oracle:oracle9i:standard_9.0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.5_.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:standard_8.0.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.6_.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.7_.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:standard_8.1.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.0.6_.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle10g:personal_10.1_.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:client_9.2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:client_9.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:standard_8.0.6_.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.0.6_.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle10g:standard_10.1_.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.6_.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:collaboration_suite:release_1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:standard_8.1.7_.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_8.1.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:standard_8.1.7_.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle10g:personal_9.0.4_.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.7_.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:standard_8.1.7_.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_8.1.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_8.1.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.7_.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:standard_8.1.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.0.5_.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle10g:standard_9.0.4_.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.5_.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:standard_8.1.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.5_.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle10g:enterprise_9.0.4_.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:collaboration_suite:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:9.2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:9.2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:8.1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:10.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:9.0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:9.0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:9.0.4:*:*:*:*:*:*:*
First Time Oracle database Server
CWE CWE-119 CWE-131

Information

Published : 2004-08-04 04:00

Updated : 2024-02-02 14:01


NVD link : CVE-2004-1363

Mitre link : CVE-2004-1363

CVE.ORG link : CVE-2004-1363


JSON object : View

Products Affected

oracle

  • enterprise_manager_database_control
  • application_server
  • collaboration_suite
  • database_server
  • e-business_suite
  • enterprise_manager
  • enterprise_manager_grid_control
CWE
CWE-131

Incorrect Calculation of Buffer Size