[22118] in bugtraq

home help back first fref pref prev next nref lref last post

RE: vulnerability in oracle binary in Oracle 8.0.5 - 8.1.6

daemon@ATHENA.MIT.EDU (Ron Cohen)
Sat Aug 4 23:05:20 2001

From: "Ron Cohen" <sec@rony.clara.net>
To: <pask@plazasite.com>, <bugtraq@securityfocus.com>, <oracle-l@faticity.com>
Date: Sun, 5 Aug 2001 02:04:09 +0100
Message-ID: <EEEJIAELPOCPHHCNFKKPMEOLCGAA.sec@rony.clara.net>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit
In-reply-to: <3B6907E5.E832A91A@plazasite.com>

BY removing the suid bit from oracle, ay client connection originated
from non-oracle user will cause oracle to revert to tcp connection
instead of pipe. be prepared to a considerable performance degrading
if you choose this tactic.

	_rony



-----Original Message-----
From: pask@plazasite.com [mailto:pask@plazasite.com]
Sent: 02 August 2001 08:57
To: bugtraq@securityfocus.com; oracle-l@faticity.com
Subject: vulnerability in oracle binary in Oracle 8.0.5 - 8.1.6

   Title:     Vulnerability in oracle binary in Oracle 8.0.5

 ....

SOLUTION:
    Chmod -s ;-)))).

STATUS:
    Vendor was contacted .

----------------
This vulnerability was researched by:
Juan Manuel Pascual Escriba            pask@plazasite.com










---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.265 / Virus Database: 137 - Release Date: 18/07/2001


home help back first fref pref prev next nref lref last post