ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [SA21111] Oracle Products Multiple Vulnerabilities



> 
> TITLE:
> Oracle Products Multiple Vulnerabilities
> 
> SECUNIA ADVISORY ID:
> SA21111
> 
> VERIFY ADVISORY:
> http://secunia.com/advisories/21111/
> 
> CRITICAL:
> Highly critical
> 
> IMPACT:
> Unknown, Manipulation of data, System access
> 
> WHERE:
> From remote
> 
> SOFTWARE:
> JD Edwards EnterpriseOne 8.x
> http://secunia.com/product/5940/
> JD Edwards OneWorld 8.x
> http://secunia.com/product/2948/
> Oracle Application Server 10g
> http://secunia.com/product/3190/
> Oracle Collaboration Suite 10.x
> http://secunia.com/product/2450/
> Oracle Database 10g
> http://secunia.com/product/3387/
> Oracle Database 8.x
> http://secunia.com/product/360/
> Oracle E-Business Suite 11i
> http://secunia.com/product/442/
> Oracle Enterprise Manager 10.x
> http://secunia.com/product/2565/
> Oracle PeopleSoft Enterprise Tools 8.x
> http://secunia.com/product/9411/
> Oracle Pharmaceutical Applications 4.x
> http://secunia.com/product/9410/
> Oracle Workflow 11.x
> http://secunia.com/product/9412/
> Oracle9i Application Server
> http://secunia.com/product/443/
> Oracle9i Collaboration Suite
> http://secunia.com/product/2451/
> Oracle9i Database Enterprise Edition
> http://secunia.com/product/359/
> Oracle9i Database Standard Edition
> http://secunia.com/product/358/
> Oracle9i Developer Suite
> http://secunia.com/product/5411/
> 
> DESCRIPTION:
> Multiple vulnerabilities have been reported in various Oracle
> products. Some have an unknown impact and others can be exploited to
> conduct SQL injection attacks or compromise a vulnerable system.
> 
> Details have been disclosed for the following vulnerabilities:
> 
> 1) Input passed to the "IMPORT_CHANGE_SET", "IMPORT_CHANGE_TABLE",
> "IMPORT_CHANGE_COLUMN", "IMPORT_SUBSCRIBER",
> "IMPORT_SUBSCRIBED_TABLE", "IMPORT_SUBSCRIBED_COLUMN",
> "VALIDATE_IMPORT", "VALIDATE_CHANGE_SET", "VALIDATE_CHANGE_TABLE",
> and "VALIDATE_SUBSCRIPTION" procedures provided by the
> "sys.dbms_cdc_impdp" package is not properly sanitised before being
> used in an SQL query. This can be exploited to manipulate SQL queries
> by injecting arbitrary SQL code.
> 
> Successful exploitation requires permissions to create a PL/SQL
> function.
> 
> 2) Input passed to the "MAIN" procedure provided by the
> "sys.kupw$worker" package is not properly sanitised before being used
> in an SQL query. This can be exploited to manipulate SQL queries by
> injecting arbitrary SQL code.
> 
> Successful exploitation requires permissions to create a PL/SQL
> function.
> 
> 3) Input passed to the "sys.dbms_stats" package is not properly
> sanitised before being used in an SQL query. This can be exploited to
> manipulate SQL queries by injecting arbitrary SQL code.
> 
> Successful exploitation requires permissions to create a PL/SQL
> function.
> 
> 4) Input passed to the "sys.dbms_upgrade" package is not properly
> sanitised before being used in an SQL query. This can be exploited to
> manipulate SQL queries by injecting arbitrary SQL code.
> 
> Successful exploitation requires permissions to create a PL/SQL
> function.
> 
> SOLUTION:
> Apply patches (see vendor advisory).
> 
> PROVIDED AND/OR DISCOVERED BY:
> 1-4) Alexander Kornbrust, Red Database Security.
> 
> The vendor also credits the following people:
> * Esteban Martinez Fayo, Application Security Inc.
> * Dr. Christian Kleinewaechter and Swen Thuemmler, infinity3.
> * David Litchfield, Next Generation Security Software.
> 
> ORIGINAL ADVISORY:
> Oracle:
> http://www.oracle.com/technology/deploy/security/critical-patc
> h-updates/cpujul2006.html
> 
> Red Database Security:
> http://www.red-database-security.com/advisory/oracle_cpu_jul_2006.html
> http://www.red-database-security.com/advisory/oracle_sql_injec
> tion_dbms_cdc_impdp.html
> http://www.red-database-security.com/advisory/oracle_sql_injec
> tion_kupw$worker.html
> http://www.red-database-security.com/advisory/oracle_sql_injec
> tion_dbms_stats.html
> http://www.red-database-security.com/advisory/oracle_sql_injec
> tion_dbms_upgrade.html
> 




 




Copyright © Lexa Software, 1996-2009.