Vulnerability Details : CVE-2004-1774
Public exploit exists!
Buffer overflow in the SDO_CODE_SIZE procedure of the MD2 package (MDSYS.MD2.SDO_CODE_SIZE) in Oracle 10g before 10.1.0.2 Patch 2 allows local users to execute arbitrary code via a long LAYER parameter.
Vulnerability category: OverflowExecute code
Products affected by CVE-2004-1774
- cpe:2.3:a:oracle:application_server:10.1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:oracle10g:personal_10.1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:oracle10g:standard_10.1.0.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-1774
97.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-1774
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
References for CVE-2004-1774
-
http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/025984.html
Vendor Advisory
-
http://www.appsecinc.com/resources/alerts/oracle/2004-0001/
-
http://www.frsirt.com/exploits/20050413.OracleExploit.sql.php
Exploit
-
http://www.securiteam.com/securitynews/5CP010KE0W.html
Exploit;Patch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/20078
-
http://www.securityfocus.com/bid/13145
Exploit;Vendor Advisory
-
http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf
Page not found | OracleVendor Advisory
Jump to