ISS Security Advisory: Multiple File System Vulnerabilities in

From: X-Force (xforceat_private)
Date: Fri May 07 1999 - 11:53:55 PDT

  • Next message: Cliff Rowley: "Re: MSIE 5 favicon bug"

    -----BEGIN PGP SIGNED MESSAGE-----
    
    ISS Security Advisory
    May 6, 1999
    
    Multiple File System Vulnerabilities in Oracle 8
    
    Synopsis:
    
    Internet Security Systems (ISS) X-Force has discovered that multiple
    vulnerabilities exist in Oracle 8 that may allow local attackers to exploit
    weaknesses in Oracle administrative tools.  Oracle is the market leader in
    enterprise database solutions. Attackers may use these vulnerabilities to
    amplify their privilege to that of the 'oracle' user.  By default, the
    oracle user controls the entire Oracle database system.  Attackers may
    launch local denial of service attacks against the database as well as alter
    or manipulate data.
    
    
    Affected Versions:
    
    ISS X-Force has determined that most current versions of Oracle 8 for Unix
    are vulnerable.  These versions include 8.03, 8.04, 8.05, and 8.15.  Oracle
    8 for Windows NT is not affected by these vulnerabilities.
    
    Description:
    
    The Oracle 8 distribution is shipped with many administrative utilities that
    are owned by the oracle user with the setuid bit enabled. Several of these
    utilities implement insecure file creation and manipulation.  These
    utilities also trust Oracle-related environment variables.  The combined
    effect of these vulnerabilities may allow local attackers to create, append
    to, or overwrite privileged oracle files.  Certain vulnerabilities exist
    that may allow local attackers to execute arbitrary commands as the oracle
    user.  Attackers may also be able to permanently elevate their privilege to
    that of the oracle user.
    
    Temporary files that follow symbolic links are a common source of
    vulnerabilities in setuid executables.  Administrators should remove or
    restrict access to setuid executables if possible.
    
    Developers of setuid programs need to take special precautions to prevent
    the introduction of vulnerabilities of this nature. ISS X-Force recommends
    that all Unix developers become familiar with Matt Bishop's secure
    programming guide, available at
    http://olympus.cs.ucdavis.edu/~bishop/secprog.html
    
    Fix Information:
    
    ISS X-Force has worked with Oracle to provide a patch for the
    vulnerabilities described in this advisory.  Oracle has provided the
    following FAQ to answer any questions concerning these vulnerabilities.
    
    Q: I've heard about a setuid security issue with the Oracle database? What
    is this all about?
    A: On Unix platforms, some executable files have the setuid bit on. It may
    be possible for a very knowledgeable user to use these executables to bypass
    your system security by elevating their operating system privileges to that
    of the Oracle user.
    
    Q: Which releases are affected by this problem?
    A: This problem affects Oracle data server releases 8.03, 8.0.4, 8.0.5, and
    8.1.5 on Unix platforms only.
    
    Q: Can I correct this problem or do I need a patch?
    A: This problem can easily be corrected. The customer can download the patch
    from the Oracle MetaLink webpages at http://www.oracle.com/support/elec_sup.
    The patch is a Unix shell script. This shell script should be run
    immediately, and also run after each relink of Oracle.
    
    Q: What is Oracle doing to fix this problem?
    A: Effective immediately, Oracle will provide the patch on Oracle's
    Worldwide Support Web pages. Oracle will ensure the patches are incorporated
    into future releases of Oracle8i (8.1.6) and Oracle8.0 (8.0.6)
    
    Q: What is Oracle doing to notify users about this problem now?
    A: Oracle is notifying all supported customers, via the Oracle Worldwide
    Support Web pages, of this issue so they can address it as required.
    
    ISS X-Force also recommends that all administrators complete a proactive
    survey on the use or potential misuse of setuid bits on privileged
    executables on their systems.
    
    Credits:
    
    These vulnerabilities were primarily researched by Dan Ingevaldson of the
    ISS X-Force.
    
    ________
    
    Copyright (c) 1999 by Internet Security Systems, Inc.  Permission is
    hereby granted for the electronic redistribution of this Security Alert.
    It is not to be edited in any way without express consent of the X-Force.
    If you wish to reprint the whole or any part of this Alert Summary in any
    other medium excluding electronic medium, please e-mail xforceat_private for
    permission.
    
    About ISS
    ISS is the pioneer and leading provider of adaptive network security
    software delivering enterprise-wide information protection solutions. ISS'
    award-winning SAFEsuite family of products enables information risk
    management within intranet, extranet and electronic commerce environments.
    By combining proactive vulnerability detection with real-time intrusion
    detection and response, ISS' adaptive security approach creates a flexible
    cycle of continuous security improvement, including security policy
    implementation and enforcement. ISS SAFEsuite solutions strengthen the
    security of existing systems and have dramatically improved the security
    posture for organizations worldwide, making ISS a trusted security advisor
    for firms in the Global 2000, 21 of the 25 largest U.S. commercial banks
    and over 35 governmental agencies. For more information, call ISS at
    678-443-6000 or 800-776-2362 or visit the ISS Web site at www.iss.net.
    
    Disclaimer
    The information within this paper may change without notice. Use of this
    information constitutes acceptance for use in an AS IS condition. There
    are NO warranties with regard to this information. In no event shall the
    author be liable for any damages whatsoever arising out of or in
    connection with the use or spread of this information. Any use of this
    information is at the user's own risk.
    
    X-Force PGP Key available at:   http://www.iss.net/xforce/sensitive.html
    as well as on MIT's PGP key server and PGP.com's key server.
    
    Please send suggestions, updates, and comments to:
    X-Force <xforceat_private> of Internet Security Systems, Inc.
    
    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.3a
    Charset: noconv
    
    iQCVAwUBNzLwJzRfJiV99eG9AQFDHwP/U4iParVoaPwPea8i+mXciMELGUDga2UM
    Iyk6T6poQ9G3ASefs+v6Lm509xDeGCcPTi1MB7SvzUBb1vx95yOhu4M9CJHWOTCJ
    3/ZlpV1Zdc7s/+N0ACxFNPozOmQvpT3OhbJKOakNQxDg3q/VbVXcJOxJ0DBKy7Xe
    d0ehW7p2OqQ=
    =6FXz
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:45:21 PDT