[12674] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Oracle 8 root exploit

daemon@ATHENA.MIT.EDU (Alan Olsen)
Mon Nov 22 14:18:35 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.4.04.9911191517460.22343-100000@clueserver.org>
Date:         Fri, 19 Nov 1999 15:19:11 -0800
Reply-To: Alan Olsen <alan@CLUESERVER.ORG>
From: Alan Olsen <alan@CLUESERVER.ORG>
X-To:         Chris Calabrese <chris_calabrese@YAHOO.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <19991116212349.23815.rocketmail@web220.mail.yahoo.com>

On Tue, 16 Nov 1999, Chris Calabrese wrote:

> I just tested some machines both with and without
> Oracle's patch for the bug related to trusting
> $ORACLE_HOME when calling dbsnmp.
>
> Good news.  The patch does indeed address the bug
> related to using sym-links from ./dbsnmpc.log and
> ./dbsnmpw.log to over-write root-owned files that
> Brock Teller reported on the other day.
>
> However, Intelligent Agent 8.1.5 (the version Brock
> reported on) does not have a patch available for it.
> This is pretty strange considering that there's a
> patch for 8.0.5 and that other 8.0.6 and 8.1.x
> releases don't have the vulnerability.


Are there patches for earlier versions of Oracle?  (Specifically 7.3.4.)
The exploit works on that version as well.

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.
    "In the future, everything will have its 15 minutes of blame."

home help back first fref pref prev next nref lref last post