{"vuid":"VU#846582","idnumber":"846582","name":"Oracle9i Database contains buffer overflow in NUMTODSINTERVAL() function","keywords":["Oracle9i Database","buffer overflow","char_expr","NUMTODSINTERVAL","day"],"overview":"Oracle9i Database contains a buffer overflow in the NUMTODSINTERVAL() function which could allow anyone who can query the server to execute arbitrary code or access data with the privileges of the vulnerable process.","clean_desc":"A buffer overflow exists in the NUMTODSINTERVAL() function. This function is responsible for handling date/time conversions. By supplying an overly long character string to the function, an attacker could overwrite a return address on the stack, resulting in the ability to execute arbitrary code or access data with the privileges of the vulnerable process. Oracle typically runs as SYSTEM on Windows and as the ORACLE user on UNIX.","impact":"Exploitation may result in the ability to execute arbitrary code or access data with the privileges of the vulnerable process.","resolution":"Apply Patch\nAccording to NGSSoftware, this problem is fixed in Oracle 9i Database Release 2, version 9.2.0.3. For further information regarding Oracle security patches, please visit the Oracle Metalilnk site: http://metalink.oracle.com (login required)","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by \nNGSSoftware","author":"This document was written by Damon Morda.","public":["http://www.nextgenss.com/advisories/ora_numtodsinterval.txt","http://www.secunia.com/advisories/10805/","http://metalink.oracle.com"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-02-06T16:18:43Z","publicdate":"2004-02-06T00:00:00Z","datefirstpublished":"2004-02-27T15:16:02Z","dateupdated":"2004-02-27T15:16:23Z","revision":11,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"13","cam_impact":"17","cam_easeofexploitation":"10","cam_attackeraccessrequired":"13","cam_scorecurrent":"13.4671875","cam_scorecurrentwidelyknown":"16.160625","cam_scorecurrentwidelyknownexploited":"26.934375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":13.4671875,"vulnote":null}