Vulnerabilities > CVE-2009-1979 - Remote Buffer Overflow vulnerability in Oracle Database Server 10.1.0.5/10.2.0.4

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
oracle
critical
nessus
exploit available
metasploit

Summary

Unspecified vulnerability in the Network Authentication component in Oracle Database 10.1.0.5 and 10.2.0.4 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2009 CPU. Oracle has not commented on claims from an independent researcher that this is related to improper validation of the AUTH_SESSKEY parameter length that leads to arbitrary code execution. Per: http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2009.html # The CVSS Base Score is 10.0 only for Windows. For Linux, Unix and other platforms, the CVSS Base Score is 7.5, and the impacts for Confidentiality, Integrity and Availability are Partial+.

Vulnerable Configurations

Part Description Count
Application
Oracle
2

Exploit-Db

  • descriptionOracle 10gR2 TNS Listener AUTH_SESSKEY Buffer Overflow. CVE-2009-1979. Remote exploit for windows platform
    idEDB-ID:16342
    last seen2016-02-01
    modified2010-11-24
    published2010-11-24
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16342/
    titleOracle 10gR2 TNS Listener AUTH_SESSKEY Buffer Overflow
  • descriptionOracle Network Authentication - Remote Buffer Overflow Vulnerability. CVE-2009-1979. Remote exploit for windows platform
    idEDB-ID:9905
    last seen2016-02-01
    modified2009-10-30
    published2009-10-30
    reporterDennis Yurichev
    sourcehttps://www.exploit-db.com/download/9905/
    titleOracle Database 10.1.0.5 <= 10.2.0.4 - AUTH_SESSKEY Length Validation Remote Buffer Overflow Vulnerability

Metasploit

descriptionThis module exploits a stack buffer overflow in Oracle. When sending a specially crafted packet containing a long AUTH_SESSKEY value to the TNS service, an attacker may be able to execute arbitrary code.
idMSF:EXPLOIT/WINDOWS/ORACLE/TNS_AUTH_SESSKEY
last seen2020-03-18
modified2017-07-24
published2010-01-21
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/oracle/tns_auth_sesskey.rb
titleOracle 10gR2 TNS Listener AUTH_SESSKEY Buffer Overflow

Nessus

NASL familyDatabases
NASL idORACLE_RDBMS_CPU_OCT_2009.NASL
descriptionThe remote Oracle database server is missing the October 2009 Critical Patch Update (CPU) and therefore is potentially affected by security issues in the following components : - Advanced Queuing - Application Express - Auditing - Authentication - Core RDBMS - Data Mining - Data Pump - Network Authentication - Net Foundation Layer - Oracle Spatial - Oracle Text - PL/SQL - Workspace Manager
last seen2020-06-02
modified2011-11-16
plugin id56066
published2011-11-16
reporterThis script is Copyright (C) 2011-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/56066
titleOracle Database Multiple Vulnerabilities (October 2009 CPU)
code
#
# (C) Tenable Network Security, Inc.
#


include('compat.inc');

if (description)
{
  script_id(56066);
  script_version("1.16");
  script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/01");

  script_cve_id(
    "CVE-2009-1007",
    "CVE-2009-1018",
    "CVE-2009-1964",
    "CVE-2009-1965",
    "CVE-2009-1971",
    "CVE-2009-1972",
    "CVE-2009-1979",
    "CVE-2009-1985",
    "CVE-2009-1991",
    "CVE-2009-1992",
    "CVE-2009-1993",
    "CVE-2009-1994",
    "CVE-2009-1995",
    "CVE-2009-1997",
    "CVE-2009-2000",
    "CVE-2009-2001"
  );
  script_bugtraq_id(
    36742,
    36743,
    36744,
    36745,
    36747,
    36748,
    36750,
    36751,
    36752,
    36754,
    36755,
    36756,
    36758,
    36759,
    36760,
    36765
  );

  script_name(english:"Oracle Database Multiple Vulnerabilities (October 2009 CPU)");
  script_summary(english:"Checks installed patch info");

  script_set_attribute(attribute:"synopsis", value:
"The remote database server is affected by multiple vulnerabilities.");

  script_set_attribute(attribute:"description", value:
"The remote Oracle database server is missing the October 2009
Critical Patch Update (CPU) and therefore is potentially affected by
security issues in the following components :

  - Advanced Queuing

  - Application Express

  - Auditing

  - Authentication

  - Core RDBMS

  - Data Mining

  - Data Pump

  - Network Authentication

  - Net Foundation Layer

  - Oracle Spatial

  - Oracle Text

  - PL/SQL

  - Workspace Manager");

  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2a9c2097");
  script_set_attribute(attribute:"solution", value:
"Apply the appropriate patch according to the October 2009 Oracle
Critical Patch Update advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploit_framework_core", value:"true");
 script_set_attribute(attribute:"metasploit_name", value:'Oracle 10gR2 TNS Listener AUTH_SESSKEY Buffer Overflow');
 script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2009/10/20");
  script_set_attribute(attribute:"patch_publication_date", value:"2009/10/20");
  script_set_attribute(attribute:"plugin_publication_date", value:"2011/11/16");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:database_server");
  script_set_attribute(attribute:"agent", value:"all");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Databases");

  script_copyright(english:"This script is Copyright (C) 2011-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("oracle_rdbms_query_patch_info.nbin", "oracle_rdbms_patch_info.nbin");

  exit(0);
}

include("oracle_rdbms_cpu_func.inc");

################################################################################
# OCT2009
patches = make_nested_array();

# RDBMS 11.1.0.7
patches["11.1.0.7"]["db"]["nix"] = make_array("patch_level", "11.1.0.7.1", "CPU", "8836375, 8833297");
patches["11.1.0.7"]["db"]["win32"] = make_array("patch_level", "11.1.0.7.3", "CPU", "8928976");
patches["11.1.0.7"]["db"]["win64"] = make_array("patch_level", "11.1.0.7.3", "CPU", "8928977");
# RDBMS 10.1.0.5
patches["10.1.0.5"]["db"]["nix"] = make_array("patch_level", "10.1.0.5.16", "CPU", "8836540");
patches["10.1.0.5"]["db"]["win32"] = make_array("patch_level", "10.1.0.5.36", "CPU", "8785211");
# RDBMS 10.2.0.4
patches["10.2.0.4"]["db"]["nix"] = make_array("patch_level", "10.2.0.4.2", "CPU", "8836308, 8833280");
patches["10.2.0.4"]["db"]["win32"] = make_array("patch_level", "10.2.0.4.26", "CPU", "8880857");
patches["10.2.0.4"]["db"]["win64"] = make_array("patch_level", "10.2.0.4.26", "CPU", "8880861");

check_oracle_database(patches:patches, high_risk:TRUE);

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/85495/tns_auth_sesskey.rb.txt
idPACKETSTORM:85495
last seen2016-12-05
published2010-01-22
reporterjduck
sourcehttps://packetstormsecurity.com/files/85495/Oracle-TNS-Listener-AUTH_SESSKEY-Buffer-Overflow..html
titleOracle TNS Listener AUTH_SESSKEY Buffer Overflow.

Seebug

  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:12802
    last seen2017-11-19
    modified2009-11-09
    published2009-11-09
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-12802
    titleOracle Network Authentication CVE-2009-1979 Remote Buffer Overflow Vulnerability
  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:66963
    last seen2017-11-19
    modified2014-07-01
    published2014-07-01
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-66963
    titleOracle Database 10.1.0.5 - 10.2.0.4 - AUTH_SESSKEY Length Validation Remote Buffer Overflow Vulnerability
  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:12818
    last seen2017-11-19
    modified2009-10-30
    published2009-10-30
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-12818
    titleOracle Database 10.1.0.5 - 10.2.0.4 AUTH_SESSKEY length validation exploit
  • bulletinFamilyexploit
    descriptionBUGTRAQ ID: 36747 CVE(CAN) ID: CVE-2009-1979 Oracle Database是一款商业性质大型数据库系统。 远程攻击者可以通过Oracle Net协议向Oracle数据库的Network Authentication组件发送恶意报文导致执行任意代码。 Oracle Database 10.2.0.4 Oracle Database 10.1.0.5 厂商补丁: Oracle ------ Oracle已经为此发布了一个安全公告(cpuoct2009)以及相应补丁: cpuoct2009:Oracle Critical Patch Update Advisory - October 2009 链接:http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2009.html
    idSSV:12562
    last seen2017-11-19
    modified2009-11-03
    published2009-11-03
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-12562
    titleOracle Network Authentication组件远程代码执行漏洞