Executive Summary

Informations
Name CVE-2003-0727 First vendor Publication 2003-10-20
Vendor Cve Last vendor Modification 2024-11-20

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 2.1 Attack Range Local
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple buffer overflows in the XML Database (XDB) functionality for Oracle 9i Database Release 2 allow local users to cause a denial of service or hijack user sessions.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0727

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

SAINT Exploits

Description Link
Oracle 9i Release 2 XDB FTP Pass Overflow More info here
Oracle 9i Release 2 XDB HTTP Pass Overflow More info here

Open Source Vulnerability Database (OSVDB)

Id Description
22266 Oracle9i XDB FTP Multiple Command Overflow

A remote overflow exists in Oracle9i Database Server. The XML Database (XDB) FTP service fails to perform proper bounds checking resulting in a stack-based buffer overflow. With a specially crafted request containing an overly long string to the 'TEST' or 'UNLOCK' command, a remote attacker can cause arbitrary code execution resulting in a loss of integrity.
22265 Oracle9i XDB FTP Long Username/Password Overflow

A remote overflow exists in Oracle9i Database Server. The XML Database (XDB) FTP service fails to perform proper bounds checking resulting in a stack-based buffer overflow. With a specially crafted request containing an overly long username or password, a remote attacker can cause arbitrary code execution resulting in a loss of integrity.
2449 Oracle9i XDB HTTP Long Username/Password Overflow

A remote overflow exists in Oracle9i Database Server. The XML Database (XDB) HTTP service fails to perform proper bounds checking resulting in a stack-based buffer overflow. With a specially crafted request containing an overly long username or password, a remote attacker can cause arbitrary code execution resulting in a loss of integrity.

Snort® IPS/IDS

Date Description
2014-01-10 ftp user name buffer overflow attempt
RuleID : 3631 - Revision : 10 - Type : SERVER-ORACLE
2014-01-10 ftp TEST command buffer overflow attempt
RuleID : 3630 - Revision : 9 - Type : SERVER-ORACLE
2014-01-10 ftp password buffer overflow attempt
RuleID : 3532 - Revision : 9 - Type : SERVER-ORACLE
2014-01-10 XDB FTP UNLOCK overflow attempt
RuleID : 3526 - Revision : 9 - Type : SERVER-ORACLE
2014-01-10 Authorization Basic overflow attempt
RuleID : 3466 - Revision : 13 - Type : WEB-MISC
2014-01-10 Basic Authorization string overflow attempt
RuleID : 16681 - Revision : 8 - Type : SERVER-WEBAPP

Sources (Detail)

http://otn.oracle.com/deploy/security/pdf/2003Alert58.pdf
https://www.exploit-db.com/exploits/42780/
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2024-11-28 23:23:21
  • Multiple Updates
2024-11-28 12:05:42
  • Multiple Updates
2021-05-04 12:02:08
  • Multiple Updates
2021-04-22 01:02:14
  • Multiple Updates
2020-05-23 13:16:44
  • Multiple Updates
2020-05-23 00:15:29
  • Multiple Updates
2017-09-28 09:22:57
  • Multiple Updates
2014-01-19 21:22:00
  • Multiple Updates
2013-05-11 11:52:36
  • Multiple Updates