Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

CERT Advisory CA-2001-16



Rookie question:  How is it possible for a buffer overflow to allow 
access?  Does the overflow automatically provide a shell?  Or does it put 
the process in some debugging mode with remote privileges?



>>>>>>>>>>>>>>>>>> Original Message <<<<<<<<<<<<<<<<<<

On 7/3/01, 4:15:50 PM, BayBrianA at aol.com wrote regarding CERT Advisory 
CA-2001-16:


>  -----BEGIN PGP SIGNED MESSAGE-----

>  CERT Advisory CA-2001-16 Oracle 8i contains buffer overflow in TNS 
listener

>     Original release date: July 03, 2001
>     Last revised: --
>     Source: CERT/CC

>     A complete revision history is at the end of this file.

>  Systems Affected

>       * Systems running Oracle 8i

>  Overview

>     A vulnerability in Oracle 8i allows remote intruders to assume 
control
>     of database servers running on victim machines. If the Oracle server
>     is running on a Windows system, an intruder may also be able to gain
>     contol of the underlying operating system.

>  I. Description

>     The COVERT labs at PGP Security have discovered a buffer overflow
>     vulnerability in Oracle 8i that allows intruders to execute arbitrary
>     code with the privileges of the TNS listener process. The
>     vulnerability occurs in a section of code that is executed prior to
>     authentication, so an intruder does not require a username or
>     password.

>     For more information, see the COVERT Labs Security Advisory, 
available
>     at

>            http://www.pgp.com/research/covert/advisories/050.asp

>  II. Impact

>     An intruder who exploits the vulnerability can remotely execute
>     arbitrary code. On UNIX systems, this code runs as the 'oracle' user.
>     If running on Windows systems, the intruder's code will run in the
>     Local System security context.

>     In either case, the attacker can gain control of the database server
>     on the victim machine. On Windows systems, the intruder can also gain
>     administrative control of the operating system.

>  III. Solutions

>     Install a patch from Oracle. More information is available in
>     Appendix A.

>  Appendix A

>  Oracle

>     Oracle has issued an alert for this vulnerability at

>            http://otn.oracle.com/deploy/security/pdf/nai_net8_bof.pdf

>     Oracle has fixed this potential security vulnerability in the 
Oracle9i
>     database server. Oracle is in the process of backporting the fix to
>     supported Oracle8i database server Releases 8.1.7 and 8.1.6 and
>     Oracle8 Release 8.0.6 on all platforms. The Oracle bug number for the
>     patch is 1489683.

>     Download the patch for your platform from Oracle's Worldwide Support
>     web site, Metalink:

>            http://metalink.oracle.com

>     Please check Metalink periodically for patch availability if the 
patch
>     for your platform is not yet available.
>       _________________________________________________________________

>     Our thanks to COVERT Labs at PGP Security for the information
>     contained in their advisory.
>       _________________________________________________________________

>     This document was written by Shawn V. Hernan. If you have feedback
>     concerning this document, please send email to:

>            
mailto:cert at cert.org?Subject=[VU#620495]%20Feedback%20CA-2001-16

>     Copyright 2001 Carnegie Mellon University.

>     Revision History
>  July 03, 2001: Initial Release

>  -----BEGIN PGP SIGNATURE-----
>  Version: PGPfreeware 5.0i for non-commercial use
>  Charset: noconv

>  iQCVAwUBO0I28QYcfu8gsZJZAQF1AQP/QvE4AO+I5HP8VXK850g83NlPiFCxlG1K
>  51GjO/KCFqK78DoBK9YWvxGaZiR6xKaxYJbGftcJh1zKwNqiRDIGk1OdeW873uhj
>  bR8vjobFMzNSZU5y9gXPa9YQWdEg1KozQH1VuNsBxRnmHu6Yi3WANbmZXYcRck2x
>  lhP8noPes/Q=
>  =nVFt
>  -----END PGP SIGNATURE-----
-
Subcription/unsubscription/info requests: send e-mail with
"subscribe", "unsubscribe", or "info" on the first line of the
message body to discuss-request at blu.org (Subject line is ignored).




BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org