Check Point Reference: | CPAI-2005-229 |
Date Published: | 19 Jul 2010 |
Severity: | High |
Last Updated: | Tuesday 10 November, 2015 |
Source: | |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Oracle Database Server is an enterprise-level relational database application suite. In addition to common basic data types, such as INT or VARCHAR, Oracle uses specialized object types to store and manage complex data objects, such as images and audio/video data. Object types are conceptually similar to classes in Object-Oriented programming languages. They have a set of attributes and methods that allow the data to be manipulated. A vulnerability exists in the Oracle Database Server's InterMedia system. This issue is caused by an insufficient sanitization of user-supplied data in SQL statements. An attacker with limited privileges may exploit this vulnerability to create a denial of service condition on a vulnerable Oracle Database Server. In an attack exploiting this vulnerability, the vulnerable Oracle Database server process utilizes 100% CPU resources. The performance of the target computer is significantly degraded. The high CPU consumption continues even after the attacker has disconnected the server. The affected service must be restarted to resume normal state. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Oracle Protection Violation.
Attack Information: Oracle Database InterMedia denial of service