Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

CERT Advisory CA-2001-16



 -----BEGIN PGP SIGNED MESSAGE-----
 
 CERT Advisory CA-2001-16 Oracle 8i contains buffer overflow in TNS listener
 
    Original release date: July 03, 2001
    Last revised: --
    Source: CERT/CC
 
    A complete revision history is at the end of this file.
 
 Systems Affected
 
      * Systems running Oracle 8i
 
 Overview
 
    A vulnerability in Oracle 8i allows remote intruders to assume control
    of database servers running on victim machines. If the Oracle server
    is running on a Windows system, an intruder may also be able to gain
    contol of the underlying operating system.
 
 I. Description
 
    The COVERT labs at PGP Security have discovered a buffer overflow
    vulnerability in Oracle 8i that allows intruders to execute arbitrary
    code with the privileges of the TNS listener process. The
    vulnerability occurs in a section of code that is executed prior to
    authentication, so an intruder does not require a username or
    password.
 
    For more information, see the COVERT Labs Security Advisory, available
    at
 
           http://www.pgp.com/research/covert/advisories/050.asp
 
 II. Impact
 
    An intruder who exploits the vulnerability can remotely execute
    arbitrary code. On UNIX systems, this code runs as the 'oracle' user.
    If running on Windows systems, the intruder's code will run in the
    Local System security context.
 
    In either case, the attacker can gain control of the database server
    on the victim machine. On Windows systems, the intruder can also gain
    administrative control of the operating system.
 
 III. Solutions
 
    Install a patch from Oracle. More information is available in
    Appendix A.
 
 Appendix A
 
 Oracle
 
    Oracle has issued an alert for this vulnerability at
 
           http://otn.oracle.com/deploy/security/pdf/nai_net8_bof.pdf
 
    Oracle has fixed this potential security vulnerability in the Oracle9i
    database server. Oracle is in the process of backporting the fix to
    supported Oracle8i database server Releases 8.1.7 and 8.1.6 and
    Oracle8 Release 8.0.6 on all platforms. The Oracle bug number for the
    patch is 1489683.
 
    Download the patch for your platform from Oracle's Worldwide Support
    web site, Metalink:
 
           http://metalink.oracle.com
 
    Please check Metalink periodically for patch availability if the patch
    for your platform is not yet available.
      _________________________________________________________________
 
    Our thanks to COVERT Labs at PGP Security for the information
    contained in their advisory.
      _________________________________________________________________
 
    This document was written by Shawn V. Hernan. If you have feedback
    concerning this document, please send email to:
 
           mailto:cert at cert.org?Subject=[VU#620495]%20Feedback%20CA-2001-16
 
    Copyright 2001 Carnegie Mellon University.
 
    Revision History
 July 03, 2001: Initial Release
 
 -----BEGIN PGP SIGNATURE-----
 Version: PGPfreeware 5.0i for non-commercial use
 Charset: noconv
 
 iQCVAwUBO0I28QYcfu8gsZJZAQF1AQP/QvE4AO+I5HP8VXK850g83NlPiFCxlG1K
 51GjO/KCFqK78DoBK9YWvxGaZiR6xKaxYJbGftcJh1zKwNqiRDIGk1OdeW873uhj
 bR8vjobFMzNSZU5y9gXPa9YQWdEg1KozQH1VuNsBxRnmHu6Yi3WANbmZXYcRck2x
 lhP8noPes/Q=
 =nVFt
 -----END PGP SIGNATURE-----
-------------- next part --------------
An embedded message was scrubbed...
From: CERT Advisory <cert-advisory at cert.org>
Subject: CERT Advisory CA-2001-16
Date: Tue, 3 Jul 2001 17:35:27 -0400 (EDT)
Size: 5480
URL: <http://lists.blu.org/pipermail/discuss/attachments/20010703/20d37913/attachment.mht>



BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org