Intrusion Prevention

Oracle.Database.Server.String.Conversion.Buffer.Overflow

Description

This indicates an attack attempt against a buffer overflow vulnerability in
Oracle Database Server.
The vulnerability is caused by lacking of checking the parameter passed to the string conversion function. It allows a remote attacker to execute arbitrary code via sending a crafted request from client.

Affected Products

Oracle Database 9i

Impact

System Comprise:Remote attackers can gain control of the vulnerable system.

Recommended Actions

Refer to the vendor's Web site for suggested workaround.
http://www.oracle.com

Other References