First published: Wed Apr 30 2003(Updated: )
Stack-based buffer overflow in Oracle Net Services for Oracle Database Server 9i release 2 and earlier allows attackers to execute arbitrary code via a "CREATE DATABASE LINK" query containing a connect string with a long USING parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Database Server | =8.0.5.1 | |
Oracle Oracle8i | =8.0x | |
Oracle Oracle9i | =9.0.1 | |
Oracle Oracle9i | =9.0.2 | |
Oracle Oracle8i | =8.0.6 | |
Oracle Database Server | =8.1.7 | |
Oracle Database Server | =8.1.5 | |
Oracle Oracle9i | =9.0 | |
Oracle Oracle8i | =8.1.6 | |
Oracle Database Server | =7.3.3 | |
Oracle Database Server | =8.1.6 | |
Oracle Oracle8i | =8.1.5 | |
Oracle Oracle9i | =9.0.1.2 | |
Oracle Oracle9i | =9.0.1.3 | |
Oracle Database Server | =8.0.2 | |
Oracle Database Server | =9.2.1 | |
Oracle Oracle8i | =8.1.7 | |
Oracle Oracle8i | =8.1.7.1 | |
Oracle Database Server | =8.0.3 | |
Oracle Database Server | =8.0.4 | |
Oracle Database Server | =9.2.2 | |
Oracle Oracle8i | =8.1.7.4 | |
Oracle Oracle8i | =8.1x | |
Oracle Oracle9i | =9.2.0.1 | |
Oracle Oracle9i | =9.2.0.2 | |
Oracle Database Server | =8.0.5 | |
Oracle Oracle8i | =8.0.6.3 | |
Oracle Database Server | =7.3.4 | |
Oracle Database Server | =8.0.6 | |
Oracle Database Server | =8.0.1 | |
Oracle Oracle9i | =9.0.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.