Stack-based buffer overflow in Oracle Net Services for Oracle Database Server 9i release 2 and previous versions allows malicious users to execute arbitrary code via a "CREATE DATABASE LINK" query containing a connect string with a long USING parameter.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
oracle database server 7.3.3 |
||
oracle database server 7.3.4 |
||
oracle database server 8.0.6 |
||
oracle database server 8.1.5 |
||
oracle database server 8.1.6 |
||
oracle oracle8i 8.1.5 |
||
oracle oracle8i 8.1.6 |
||
oracle oracle9i 9.0.1.2 |
||
oracle oracle9i 9.0.1.3 |
||
oracle database server 8.0.1 |
||
oracle database server 8.0.2 |
||
oracle database server 8.1.7 |
||
oracle database server 9.2.1 |
||
oracle oracle8i 8.1.7 |
||
oracle oracle8i 8.1.7.1 |
||
oracle oracle9i 9.0.1.4 |
||
oracle oracle9i 9.0.2 |
||
oracle database server 8.0.3 |
||
oracle database server 8.0.4 |
||
oracle database server 9.2.2 |
||
oracle oracle8i 8.0.6 |
||
oracle oracle8i 8.1.7.4 |
||
oracle oracle8i 8.1x |
||
oracle oracle9i 9.2.0.1 |
||
oracle oracle9i 9.2.0.2 |
||
oracle database server 8.0.5 |
||
oracle database server 8.0.5.1 |
||
oracle oracle8i 8.0.6.3 |
||
oracle oracle8i 8.0x |
||
oracle oracle9i 9.0 |
||
oracle oracle9i 9.0.1 |