Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2003-0634
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Stack-based buffer overflow in the PL/SQL EXTPROC functionality for Oracle9i Database Release 2 and 1, and Oracle 8i, allows authenticated database users, and arbitrary database users in some cases, to execute arbitrary code via a long library name..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 7.5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:oracle:oracle8i:standard_8.1.7_.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle9i:standard_9.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle9i:standard_9.0.1.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.6_.0.0:*:*:*:*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle9i:client_9.2.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle9i:client_9.2.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle9i:personal_9.2.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle9i:personal_9.2.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.5_.1.0:*:*:*:*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle8i:standard_8.1.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle9i:standard_9.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle9i:standard_9.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle9i:standard_9.2.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle9i:standard_9.0.1.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle8i:standard_8.1.7_.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.7_.1.0:*:*:*:*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.5_.0.2:*:*:*:*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.6_.1.0:*:*:*:*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle9i:personal_9.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.7_.0.0:*:*:*:*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle9i:standard_9.0.1.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle8i:standard_8.1.7_.0.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle9i:standard_9.2.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.5_.0.0:*:*:*:*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle8i:standard_8.1.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:oracle8i:standard_8.1.5:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.securityfocus.com/bid/8267
- http://otn.oracle.com/deploy/security/pdf/2003alert57.pdf
- http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0105.html
- http://www.kb.cert.org/vuls/id/936868
- http://marc.info/?l=bugtraq&m=105916455814904&w=2
- http://marc.info/?l=ntbugtraq&m=105915485303327&w=2
- http://marc.info/?l=bugtraq&m=105914979629857&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/12721