[31579] in bugtraq

home help back first fref pref prev next nref lref last post

Update to the Oracle EXTPROC advisory

daemon@ATHENA.MIT.EDU (NGSSoftware Insight Security Resea)
Fri Sep 12 18:21:45 2003

Message-ID: <09cf01c37929$9ba97560$8d01010a@GLADIUS>
From: "NGSSoftware Insight Security Research" <nisr@nextgenss.com>
To: <bugtraq@securityfocus.com>, <NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM>,
        <vulnwatch@vulnwatch.org>
Date: Fri, 12 Sep 2003 13:30:10 +0100
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

Hello,
Please note that Oracle has updated the extproc buffer overrun advisory.
There was some confusion caused because the intial Oracle advisory stated
that a username and password were required to exploit the overflow which was
contrary to the results of our research; we concluded that no user ID or
password was necessary. Whilst I answered many of the mails querying this
discrepancy, for those that I did not have a chance to reply to, please
accept my apologies. The updated Oracle can be found here :
http://otn.oracle.com/deploy/security/pdf/2003alert57.pdf . In summary,
Oracle 9i Database Release 2, Oracle 9i Database Release 1 and Oracle 8i
Database (8.1.x) are all vulnerable and that "Risk to exposure is high, as a
valid username and password is not needed in all cases to exploit this
potential vulnerability."
Cheers,
David Litchfield
NGSSoftware Ltd
http://www.nextgenss.com/
+44(0)208 401 0070

NGSSoftware's SQuirrel for Oracle, an advanced security audit tool for
Oracle, checks for these vulnerabilities. More information is available from
http://www.nextgenss.com/products/squirrelfororacle.htm .






home help back first fref pref prev next nref lref last post