CVE-2001-1216
CVSS7.5
发布时间 :2001-12-21 00:00:00
修订时间 :2008-09-05 16:25:58
NMCOS    

[原文]Buffer overflow in PL/SQL Apache module in Oracle 9i Application Server allows remote attackers to execute arbitrary code via a long request for a help page.


[CNNVD]Oracle 9i应用服务器PL/SQL Apache模块远程缓冲区溢出漏洞(CNNVD-200112-130)

        
        Oracle 9i应用服务器基于Apache Web服务器,支持SOAP、PL/SQL、XSQL、JSP等环境。 PL/SQL Apache module for Oracle 9iAS提供了对数据库访问描述符的远程管理和帮助页。
        此程序模块存在严重的远程缓冲区溢出漏洞,可以使攻击者通过溢出攻击在主机上执行任意指令。
        当向服务器请求一个超长的help页时,会导致服务器程序堆栈溢出,改写返回地址,从而去执行攻击者指定的指令。在Windows NT/2000系统上,攻击者的指令是以SYSTEM身份执行的,因为Apache进程是以这个权限执行的。对于其他系统攻击者一般可以得到普通用户访问权限。需要注意的是当访问/admin_/目录的时候用户会被提示输入用户名和口令,然而,当用户试图请求帮助页是则不需要输入口令。
        <*链接:http://archives.neohapsis.com/archives/bugtraq/2001-12/0225.html
         http://otn.oracle.com/deploy/security/pdf/modplsql.pdf
        *>

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1216
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-1216
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200112-130
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/500203
(VENDOR_ADVISORY)  CERT-VN  VU#500203
http://www.securityfocus.com/bid/3726
(VENDOR_ADVISORY)  BID  3726
http://www.iss.net/security_center/static/7727.php
(VENDOR_ADVISORY)  XF  oracle-appserver-modplsql-bo(7727)
http://www.securityfocus.com/archive/1/246663
(VENDOR_ADVISORY)  BUGTRAQ  20011221 Buffer Overflow in Oracle 9iAS (#NISR20122001)
http://otn.oracle.com/deploy/security/pdf/modplsql.pdf
(UNKNOWN)  CONFIRM  http://otn.oracle.com/deploy/security/pdf/modplsql.pdf

- 漏洞信息

Oracle 9i应用服务器PL/SQL Apache模块远程缓冲区溢出漏洞
高危 边界条件错误
2001-12-21 00:00:00 2005-10-20 00:00:00
远程  
        
        Oracle 9i应用服务器基于Apache Web服务器,支持SOAP、PL/SQL、XSQL、JSP等环境。 PL/SQL Apache module for Oracle 9iAS提供了对数据库访问描述符的远程管理和帮助页。
        此程序模块存在严重的远程缓冲区溢出漏洞,可以使攻击者通过溢出攻击在主机上执行任意指令。
        当向服务器请求一个超长的help页时,会导致服务器程序堆栈溢出,改写返回地址,从而去执行攻击者指定的指令。在Windows NT/2000系统上,攻击者的指令是以SYSTEM身份执行的,因为Apache进程是以这个权限执行的。对于其他系统攻击者一般可以得到普通用户访问权限。需要注意的是当访问/admin_/目录的时候用户会被提示输入用户名和口令,然而,当用户试图请求帮助页是则不需要输入口令。
        <*链接:http://archives.neohapsis.com/archives/bugtraq/2001-12/0225.html
         http://otn.oracle.com/deploy/security/pdf/modplsql.pdf
        *>

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 编辑$ORACLE_HOME$\Apache\modplsql\cfg目录中的wdbsvr.app文件,把"adminPath"变量从默认的"/admin_"改为其它的。
        * 设置Web访问认证确信只有授权用户才能访问。
        厂商补丁:
        Oracle
        ------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Oracle Oracle 9i Application Server:
        Oracle Patch 2128936
        
        http://metalink.oracle.com

- 漏洞信息

9459
Oracle PL/SQL (mod_plsql) Apache Module Help Page Request Remote Overflow
Remote / Network Access Input Manipulation
Loss of Integrity
Vendor Verified

- 漏洞描述

- 时间线

2001-12-11 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Oracle 9I Application Server PL/SQL Apache Module Buffer Overflow Vulnerability
Boundary Condition Error 3726
Yes No
2001-12-20 12:00:00 2009-07-11 09:06:00
This vulnerability was submitted to BugTraq on December 20th, 2001 by David Litchfield <david@nextgenss.com>.

- 受影响的程序版本

Oracle Oracle9i Application Server
- Compaq Tru64 5.1
- Compaq Tru64 5.0 f
- Compaq Tru64 5.0 a
- Compaq Tru64 5.0
- Compaq Tru64 4.0 g
- HP HP-UX 11.11
- HP HP-UX 11.0 4
- HP HP-UX 11.0
- HP HP-UX 10.34
- HP HP-UX 10.30
- HP HP-UX 10.26
- HP HP-UX 10.20
- HP HP-UX 10.16
- HP HP-UX 10.10
- HP HP-UX 10.9
- HP HP-UX 10.8
- HP HP-UX 10.1 0
- HP HP-UX 10.0 1
- HP HP-UX 10.0
- HP HP-UX 9.10
- HP HP-UX 9.9
- HP HP-UX 9.8
- HP HP-UX 9.7
- HP HP-UX 9.6
- HP HP-UX 9.5
- HP HP-UX 9.4
- HP HP-UX 9.3
- HP HP-UX 9.1
- HP HP-UX 9.0
- HP HP-UX 8.9
- HP HP-UX 8.8
- HP HP-UX 8.7
- HP HP-UX 8.6
- HP HP-UX 8.5
- HP HP-UX 8.4
- HP HP-UX 8.2
- HP HP-UX 8.1
- HP HP-UX 8.0
- HP HP-UX 7.8
- HP HP-UX 7.6
- HP HP-UX 7.4
- HP HP-UX 7.2
- HP HP-UX 7.0
- IBM AIX 4.3.3
- IBM AIX 4.3.2
- IBM AIX 4.3.1
- IBM AIX 4.3
- IBM AIX 4.2.1
- IBM AIX 4.2
- IBM AIX 4.1.5
- IBM AIX 4.1.4
- IBM AIX 4.1.3
- IBM AIX 4.1.2
- IBM AIX 4.1.1
- IBM AIX 4.1
- IBM AIX 4.0
- IBM AIX 3.2.5
- IBM AIX 3.2.4
- IBM AIX 3.2
- IBM AIX 3.1
- IBM AIX 3.0 x
- IBM AIX 2.2.1
- IBM AIX 1.3
- IBM AIX 1.2.1
- IBM AIX 5.1
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Sun Solaris 2.5.1 _x86
- Sun Solaris 2.5.1
- Sun Solaris 1.1.4 -JL
- Sun Solaris 1.1.4
- Sun Solaris 1.1.3 _U1
- Sun Solaris 1.1.3
- Sun Solaris 1.1.2
- Sun Solaris 1.1.1
- Sun Solaris 8_x86
- Sun Solaris 8_sparc
- Sun Solaris 7.0_x86
- Sun Solaris 7.0
- Sun Solaris 2.6_x86HW5/98
- Sun Solaris 2.6_x86HW3/98
- Sun Solaris 2.6_x86
- Sun Solaris 2.6 HW5/98
- Sun Solaris 2.6 HW3/98
- Sun Solaris 2.6
- Sun Solaris 2.5_x86
- Sun Solaris 2.5
- Sun Solaris 2.4_x86
- Sun Solaris 2.4
- Sun Solaris 2.3
- Sun Solaris 2.2
- Sun Solaris 2.1
- Sun Solaris 2.0
- Sun Solaris 1.2
- Sun Solaris 1.1

- 漏洞讨论

Oracle 9i Application Server comes with an Apache-based web server and support for environments such as SOAP, PL/SQL, XSQL and JSP.

The PL/SQL Apache module for Oracle 9iAS provides functionality for remote
administration of the Database Access Descriptors and access to help pages.

A remotely exploitable buffer overflow exists in the PL/SQL Apache module. A request for an excessively long help page can cause stack variables to be overwritten. As a result, the return address can be overwritten with attacker-supplied values, allowing for arbitrary code execution.

On Microsoft Windows NT/2000 systems this may mean that the attacker-supplied code is executed with SYSTEM level privileges, as this is the privilege level that the Apache process runs under. On other operating systems successful exploitation may merit local access for the attacker.

It should be noted that when a web user tries to access an /admin_/ page, the user will receive a challenge for authentication via a username/password prompt. However, no such challenge is issued when a web user attempts to access help pages.

This issue may also be exploited to cause a crude denial of service attack.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

Oracle has provided a patch which rectifies this issue.


Oracle Oracle9i Application Server

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站