Stack-based buffer overflow in Oracle Net Services for Oracle Database Server 9i release 2 and earlier allows attackers to execute arbitrary code via a "CREATE DATABASE LINK" query containing a connect string with a long USING parameter.
https://exchange.xforce.ibmcloud.com/vulnerabilities/11885
http://www.securityfocus.com/bid/7453
http://www.ciac.org/ciac/bulletins/n-085.shtml
http://otn.oracle.com/deploy/security/pdf/2003alert54.pdf