First published: Mon Mar 03 2003(Updated: )
Buffer overflow in ORACLE.EXE for Oracle Database Server 9i, 8i, 8.1.7, and 8.0.6 allows remote attackers to execute arbitrary code via a long username that is provided during login, as exploitable through client applications that perform their own authentication, as demonstrated using LOADPSP.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Oracle9i | =9.0.1 | |
Oracle Oracle9i | =9.0.2 | |
Oracle Oracle9i | =9.0 | |
Oracle Database | =9.2.1 | |
Oracle 8i | =8.1.7.1 | |
Oracle 8i | =8.1.7 | |
Oracle Oracle9i | =9.0.1.3 | |
Oracle Oracle9i | =9.0.1.2 | |
Oracle Database | =9.2.2 | |
Oracle Database | =8.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0095 has a high severity level due to its potential to allow remote attackers to execute arbitrary code.
To fix CVE-2003-0095, it is recommended to apply the latest patches provided by Oracle for the affected database versions.
CVE-2003-0095 affects Oracle Database Server versions 9i, 8i, and several other variations prior to version 9.2.
Yes, CVE-2003-0095 can be exploited remotely through a crafted long username during the authentication process.
The vulnerability in CVE-2003-0095 is a buffer overflow in the ORACLE.EXE component of Oracle Database Server.