https://www.exploit-db.com/exploits/28293
Oracle 10g - Alter Session Integer Overflow






漏洞ID | 1055830 | 漏洞类型 | |
发布时间 | 2006-07-27 | 更新时间 | 2006-07-27 |
![]() |
N/A | ![]() |
N/A |
漏洞平台 | Multiple | CVSS评分 | N/A |
|漏洞来源
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/19201/info
Oracle 10g is reportedly prone to a integer-overflow vulnerability because the application fails to allocate a large enough data type to accommodate user-supplied input before using it in a query. This issue has not been confirmed.
An attacker could exploit this vulnerability to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will likely cause denial-of-service conditions.
Reports indicate that Oracle 10g R2 is vulnerable; other versions may also be affected.
Connect with any user with only CREATE SESSION
SQL> alter session set events '10046 trace name context forever, level 16';
检索漏洞
开始时间
结束时间