CVE-2002-0559

critical

Description

Buffer overflows in PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allow remote attackers to cause a denial of service or execute arbitrary code via (1) a long help page request without a dadname, which overflows the resulting HTTP Location header, (2) a long HTTP request to the plsql module, (3) a long password in the HTTP Authorization, (4) a long Access Descriptor (DAD) password in the addadd form, or (5) a long cache directory name.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/8098

https://exchange.xforce.ibmcloud.com/vulnerabilities/8097

https://exchange.xforce.ibmcloud.com/vulnerabilities/8096

https://exchange.xforce.ibmcloud.com/vulnerabilities/8095

http://www.securityfocus.com/bid/4032

http://www.nextgenss.com/papers/hpoas.pdf

http://www.kb.cert.org/vuls/id/923395

http://www.kb.cert.org/vuls/id/878603

http://www.kb.cert.org/vuls/id/750299

http://www.kb.cert.org/vuls/id/659043

http://www.kb.cert.org/vuls/id/313280

http://www.cert.org/advisories/CA-2002-08.html

http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf

http://online.securityfocus.com/archive/1/254426

Details

Source: Mitre, NVD

Published: 2002-07-03

Updated: 2017-12-19

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Severity: Critical