[18698] in bugtraq

home help back first fref pref prev next nref lref last post

Patch for Potential Security Vulnerability in Oracle Connection

daemon@ATHENA.MIT.EDU (Security Alerts)
Thu Jan 18 18:30:41 2001

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <3A675E70.CADC076D@oracle.com>
Date:         Thu, 18 Jan 2001 13:21:52 -0800
Reply-To: Security Alerts <secalert_us@ORACLE.COM>
From: Security Alerts <secalert_us@ORACLE.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

Patch for Potential Security Vulnerability in Oracle Connection Manager
Control

Description:
A potential security vulnerability has been discovered in Oracle
Connection Manager Control (CMCTL). This vulnerability can force a
buffer overflow in CMCTL which can be exploited to gain elevated
operating system privilege sets of EGID DBA and EUID ORACLE by an
ordinary user supplying command-line arguments to CMCTL. This
vulnerability is only possible if SETGID and SETUID bits, respectively,
are set on the CMCTL executable.

Solution:
Oracle has fixed this vulnerability in patchsets for Oracle8i, Releases
8.1.6 and 8.1.5, and Oracle8, Releases 8.0.5, 8.0.4 and 8.0.3. The
patchsets are available on Oracle's Support Services site, Metalink,
http://metalink.oracle.com. All other production releases of the Oracle
database server contain this security patch by default.

Credits:
Oracle wishes to thank Juan Manuel Pascual Escriba for discovering this
security vulnerability and promptly bringing it to Oracle's attention.

home help back first fref pref prev next nref lref last post