?? 2621.txt
字號:
Rule:--Sid:2621--Summary:This event is generated when an attempt is made to exploit a knownvulnerability in a Oracle database implementation.--Impact:Serious. Execution of arbitrary code may be possible. A Denial ofService (DoS) condition may also be caused.--Detailed Information:Oracle databases may use a built-in procedure to assist in usefultasks. The "register_flavor_change" procedure contains aprogramming error that may allow an attacker to execute a bufferoverflow attack.This overflow is triggered by a long string in a parameter for theprocedure.If you are running Oracle on a Windows server, make sure that thevariable $ORACLE_PORTS is set to a value of "any".--Affected Systems: Oracle 9i--Attack Scenarios:An attacker can supply a long string to the second variable to causethe overflow. The result could permit the attacker to gain escalatedprivileges and run code of their choosing. This attack requires anattacker to logon to the database with a valid username and passwordcombination.--Ease of Attack:Simple.--False Positives:None known.--False Negatives:None known.--Corrective Action:Ensure the system is using an up to date version of the software and hashad all vendor supplied patches applied.--Contributors:Sourcefire Vulnerability Research TeamMatt Watchinski <mwatchinski@sourcefire.com>Brian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>Judy Novak <judy.novak@sourcefire.com>--Additional References:Other:http://www.appsecinc.com/Policy/PolicyCheck97.html--
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -