Ravens PHP Scripts

Oracle Products Multiple Vulnerabilities
Date: Wednesday, January 17, 2007 @ 23:38:28 PST
Topic: Security


SECUNIA ADVISORY ID: SA23794

VERIFY ADVISORY: http://secunia.com/advisories/23794/

CRITICAL: Highly critical

IMPACT: Unknown, Cross Site Scripting, Manipulation of data, Exposure of sensitive informatio

SOFTWARE:
Oracle Database 10g - http://secunia.com/product/3387/
Oracle Application Server 10g - http://secunia.com/product/3190/
Oracle E-Business Suite 11i - http://secunia.com/product/442/
Oracle Enterprise Manager 10.x - http://secunia.com/product/2565/
Oracle PeopleSoft Enterprise Tools 8.x - http://secunia.com/product/9411/
Oracle9i Database Enterprise Edition - http://secunia.com/product/359/
Oracle9i Database Standard Edition - http://secunia.com/product/358/
Oracle Developer Suite 10g - http://secunia.com/product/5410/
Oracle9i Developer Suite - http://secunia.com/product/5411/
Oracle9i Application Server - http://secunia.com/product/443/

DESCRIPTION: Multiple vulnerabilities have been reported in various Oracle products. Some of these vulnerabilities have unknown impacts while others can be exploited to gain access to sensitive information, cause a DoS (Denial of Service), conduct cross-site scripting and SQL injection attacks, and potentially compromise a vulnerable system.




Details are available for the following vulnerabilities:

1) A boundary error in the ONS (Oracle Notification Service) can be exploited to cause a buffer overflow via a specially crafted packet sent to the service (default port 6200/TCP).

2) Certain input processed by the Oracle XML DB is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

3) Certain input processed by the DBMS_AQ_INV package is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitary SQL code

4) An input validation error in EmChartBean can be exploited to access files outside of the web root via directory traversal attacks.

Some vulnerabilities reported in various packages also affect certain Oracle products. For more information: SA22130 SA21709 SA22130

SOLUTION: Apply patches (see the vendor's advisory).

PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
* Andy Davis, Information Risk Management Plc
* Vicente Aguilera Diaz, Internet Security Auditors, S.L.
* Esteban Martinez Fayo, Application Security, Inc.
* Tony Fogarty, BT Global Services
* Oliver Karow, Symantec Vulnerability Research
* Joxean Koret
* Alexander Kornbrust, Red Database Security
* David Litchfield and Mark Litchfield, NGSSoftware
* noderat ratty.

ORIGINAL ADVISORY: Oracle: http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html

Red Database Security:
http://www.red-database-security.com/advisory/oracle_buffer_overflow_ons.html
http://www.red-database-security.com/advisory/oracle_xmldb_css2.html
http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aq_inv.html

Symantec Vulnerability Research: http://www.symantec.com/enterprise/research/SYMSA-2007-001.txt

OTHER REFERENCES:
SA22130: http://secunia.com/advisories/22130
SA21709: http://secunia.com/advisories/21709
SA22130: http://secunia.com/advisories/22130






This article comes from Ravens PHP Scripts
http://www.ravenphpscripts.com

The URL for this story is:
http://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2665