Vulnerability Details : CVE-2002-0965
Public exploit exists!
Buffer overflow in TNS Listener for Oracle 9i Database Server on Windows systems, and Oracle 8 on VM, allows local users to execute arbitrary code via a long SERVICE_NAME parameter, which is not properly handled when writing an error message to a log file.
Vulnerability category: OverflowExecute code
Products affected by CVE-2002-0965
- cpe:2.3:a:oracle:oracle9i:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:oracle9i:9.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:oracle9i:9.0.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2002-0965
95.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2002-0965
-
Oracle 8i TNS Listener SERVICE_NAME Buffer Overflow
Disclosure Date: 2002-05-27First seen: 2020-04-26exploit/windows/oracle/tns_service_nameThis module exploits a stack buffer overflow in Oracle. When sending a specially crafted packet containing a long SERVICE_NAME to the TNS service, an attacker may be able to execute arbitrary code. Authors: - MC <mc@metasploit.com>
CVSS scores for CVE-2002-0965
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2002-0965
-
http://online.securityfocus.com/archive/1/276526
-
http://www.iss.net/security_center/static/9288.php
-
http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0096.html
-
http://www.kb.cert.org/vuls/id/630091
US Government Resource
-
http://www.securityfocus.com/bid/4845
Oracle TNSListener SERVICE_NAME Remote Buffer Overflow VulnerabilityPatch;Vendor Advisory
-
http://otn.oracle.com/deploy/security/pdf/net9_dos_alert.pdf
Patch;Vendor Advisory
Jump to