Integrigy Security Alert - Oracle E-Business Suite FNDWRR Buffer Overflow

From: Integrigy Security Alerts (alertsat_private)
Date: Thu Jul 24 2003 - 09:51:27 PDT

  • Next message: Integrigy Security Alerts: "Integrigy Security Alert - Oracle E-Business Suite AOL/J Setup Test Information Disclosure"

    Integrigy Security Alert
    ______________________________________________________________________
    
    Oracle E-Business Suite FNDWRR Buffer Overflow
    July 23, 2003
    ______________________________________________________________________
    
    Summary:
    
    The Oracle Applications FNDWRR CGI program, used to retrieve report output
    from the Concurrent Manager server via a web browser, has a remotely
    exploitable buffer overflow.  A mandatory patch from Oracle is required to
    solve this security issue.
    
    Product:    Oracle E-Business Suite
    Versions:   11.0 and 11.5.1 - 11.5.8
    Platforms:  All platforms
    Risk Level: High
    ______________________________________________________________________
    
    Description:
    
    The Oracle Applications Web Report Review (FNDWRR) program is used to view
    reports and logs in a web browser.  FNDWRR is implemented as a CGI program.
    The FNDWRR CGI program is named "FNDWRR.exe" on both UNIX and Windows
    platforms.
    
    A buffer overflow exists in the FNDWRR program allowing an attacker to
    potentially gain control of the process and execute arbitrary code on the
    server.  This buffer overflow can be remotely exploited using a web browser
    and an overly long URL.
    
    Solution:
    
    Oracle has released patches for Oracle Applications 11.0 and 11i to correct
    this vulnerability.  Oracle has fixed the buffer overflow in the FNDWRR
    executable and related libraries.
    
    The following Oracle patches must be applied --
    
          Version     Patch
          -------     -----
          11.0        2919943     (All Releases)
          11i         2919943     (11.5.1 - 11.5.8)
    
    Oracle Applications customers should consider this vulnerability high risk
    and apply the above patch during the next maintenance cycle.  Customers with
    Internet facing application servers should apply the patch immediately.
    
    Appropriate testing and backups should be performed before applying any
    patches.
    
    Additional Information:
    
      http://www.integrigy.com/resources.htm
      http://otn.oracle.com/deploy/security/pdf/2003alert56.pdf
    
    For more information or questions regarding this security alert, please
    contact us at alertsat_private
    
    Credit:
    
    This vulnerability was discovered by Stephen Kost of Integrigy Corporation.
    ______________________________________________________________________
    
    About Integrigy Corporation (www.integrigy.com)
    
    Integrigy Corporation is a leader in application security for large
    enterprise, mission critical applications. Our application vulnerability
    assessment tool, AppSentry, assists companies in securing their largest and
    most important applications. Integrigy Consulting offers security assessment
    services for leading ERP and CRM applications.
    
    For more information, visit www.integrigy.com.
    



    This archive was generated by hypermail 2b30 : Thu Jul 24 2003 - 10:55:28 PDT