CVE-2003-1208
Gravedad CVSS v2.0:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
03/12/2004
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Multiple buffer overflows in Oracle 9i 9 before 9.2.0.3 allow local users to execute arbitrary code by (1) setting the TIME_ZONE session parameter to a long value, or providing long parameters to the (2) NUMTOYMINTERVAL, (3) NUMTODSINTERVAL or (4) FROM_TZ functions.
Impacto
Puntuación base 2.0
10.00
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:oracle9i:personal_9.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:oracle9i:personal_9.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:oracle9i:personal_9.2.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:oracle9i:personal_9.2.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:oracle9i:standard_9.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:oracle9i:standard_9.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:oracle9i:standard_9.0.1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:oracle9i:standard_9.0.1.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:oracle9i:standard_9.0.1.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:oracle9i:standard_9.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:oracle9i:standard_9.2:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0030.html
- http://secunia.com/advisories/10805
- http://www.ciac.org/ciac/bulletins/o-093.shtml
- http://www.kb.cert.org/vuls/id/240174
- http://www.kb.cert.org/vuls/id/399806
- http://www.kb.cert.org/vuls/id/819126
- http://www.kb.cert.org/vuls/id/846582
- http://www.nextgenss.com/advisories/ora_from_tz.txt
- http://www.nextgenss.com/advisories/ora_numtodsinterval.txt
- http://www.nextgenss.com/advisories/ora_numtoyminterval.txt
- http://www.nextgenss.com/advisories/ora_time_zone.txt
- http://www.osvdb.org/3837
- http://www.osvdb.org/3838
- http://www.osvdb.org/3839
- http://www.osvdb.org/3840
- http://www.securityfocus.com/bid/9587
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15060
- http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0030.html
- http://secunia.com/advisories/10805
- http://www.ciac.org/ciac/bulletins/o-093.shtml
- http://www.kb.cert.org/vuls/id/240174
- http://www.kb.cert.org/vuls/id/399806
- http://www.kb.cert.org/vuls/id/819126
- http://www.kb.cert.org/vuls/id/846582
- http://www.nextgenss.com/advisories/ora_from_tz.txt
- http://www.nextgenss.com/advisories/ora_numtodsinterval.txt
- http://www.nextgenss.com/advisories/ora_numtoyminterval.txt
- http://www.nextgenss.com/advisories/ora_time_zone.txt
- http://www.osvdb.org/3837
- http://www.osvdb.org/3838
- http://www.osvdb.org/3839
- http://www.osvdb.org/3840
- http://www.securityfocus.com/bid/9587
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15060