Vulnerabilities > CVE-2007-5504 - Buffer Overflow vulnerability in Oracle Database Server 10.1.0.5/9.0.1.5
Attack vector
NETWORK Attack complexity
LOW Privileges required
SINGLE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5+ and 10.1.0.5 unknown impact and remote attack vectors, related to (1) Import (DB01) and (2) Advanced Queuing (DB25). NOTE: as of 20071108, Oracle has not disputed reliable researcher claims that DB25 is for a buffer overflow in the DBLINK_INFO procedure in the DBMS_AQADM_SYS package.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Nessus
NASL family | Databases |
NASL id | ORACLE_RDBMS_CPU_OCT_2007.NASL |
description | The remote Oracle database server is missing the October 2007 Critical Patch Update (CPU) and therefore is potentially affected by security issues in the following components : - Advanced Security Option - Advanced Queuing - Core RDBMS - Database Control - Export - Import - Oracle Database Vault - Oracle Help for Web - Oracle Internet Directory - Oracle Net Services - Oracle Text - Spatial - SQL Execution - XML DB - Workspace Manager |
last seen | 2020-06-02 |
modified | 2011-11-16 |
plugin id | 56058 |
published | 2011-11-16 |
reporter | This script is Copyright (C) 2011-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/56058 |
title | Oracle Database Multiple Vulnerabilities (October 2007 CPU) |
References
- http://marc.info/?l=bugtraq&m=119332677525918&w=2
- http://secunia.com/advisories/27251
- http://secunia.com/advisories/27409
- http://www.appsecinc.com/resources/alerts/oracle/2007-08.shtml
- http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html
- http://www.securityfocus.com/archive/1/482923/100/100/threaded
- http://www.securityfocus.com/bid/26235
- http://www.securitytracker.com/id?1018823
- http://www.us-cert.gov/cas/techalerts/TA07-290A.html
- http://www.vupen.com/english/advisories/2007/3524
- http://www.vupen.com/english/advisories/2007/3626