First published: Tue Aug 31 2004(Updated: )
Buffer overflow in the SDO_CODE_SIZE procedure of the MD2 package (MDSYS.MD2.SDO_CODE_SIZE) in Oracle 10g before 10.1.0.2 Patch 2 allows local users to execute arbitrary code via a long LAYER parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Application Server | =10.1.0.2 | |
Oracle Database 10g | =enterprise_10.1.0.2 | |
Oracle Database 10g | =personal_10.1.0.2 | |
Oracle Database 10g | =standard_10.1.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1774 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2004-1774, update to Oracle 10g version 10.1.0.2 Patch 2 or later.
CVE-2004-1774 affects local users of Oracle 10g versions prior to 10.1.0.2 Patch 2.
CVE-2004-1774 is a buffer overflow vulnerability in the SDO_CODE_SIZE procedure.
Attackers can execute arbitrary code on affected systems by exploiting the buffer overflow in CVE-2004-1774.