more info on DBMS_SYSTEM.KSDWRT
This can only be fixed by applying the patches from alert 68. A good practice if you do use this function is to wrapper the function with code of your own to check the length of the parameters used. Keep the parameter lengths to suitable values such as 80 characters so that the text fits on a standard screen or any other suitably short value. This will also enable you to still use long strings but they would be transposed to multiple calls to DBMS_SYSTEM.KSDWRT.
The ideal situation is to not allow access to this package or its functions.
There has been 2 Comments posted on this article
November 22nd, 2004 at 05:25 pm
Pete Finnigan says:
The default is that no normal users have been granted access to this package so it should not be possible to exploit it unless access to a user with rights to execute this package is available. e.g - the DBA has granted execute privileges on it. Whether it can be executed remotely via the HTTP server will depend on setup.
November 22nd, 2004 at 04:04 pm
Pete Finnigan says:
is this possibleto access throw oracle http server,if we give the proper privilage?
regards