vendor:
Oracle Database
by:
Anonymous
7.2
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Oracle Database
Affected Version From: Oracle 8.1.5 (8i)
Affected Version To: Oracle 8.1.5 (8i)
Patch Exists: NO
Related CWE: N/A
CPE: a:oracle:oracle_database:8.1.5
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, RH 6.2, RH 6.1
2002
Buffer Overflow in cmctl
A vulnerability exists in cmctl, part of the Oracle 8i installation, that can allow elevation of privileges. The problem occurs in the way cmctl handles the user-supplied command line arguments. The string representing argv[1] (the first user-supplied commandline argument) is copied into a buffer of predefined length without being checked to ensure that its length does not exceed the size of the destination buffer. As a result, the excessive data that is written to the buffer will write past its boundaries and overwrite other values on the stack (such as the return address). This can lead to the user executing supplied shellcode with the effective privileges of cmctl, egid dba and euid oracle.
Mitigation:
Ensure that user-supplied command line arguments are checked to ensure that its length does not exceed the size of the destination buffer.