[VulnWatch] Update to the Oracle EXTPROC advisory

From: NGSSoftware Insight Security Research (nisrat_private)
Date: Fri Sep 12 2003 - 05:30:10 PDT

  • Next message: Frog Man: "[VulnWatch] vbPortal : SQL Injection"

    Hello,
    Please note that Oracle has updated the extproc buffer overrun advisory.
    There was some confusion caused because the intial Oracle advisory stated
    that a username and password were required to exploit the overflow which was
    contrary to the results of our research; we concluded that no user ID or
    password was necessary. Whilst I answered many of the mails querying this
    discrepancy, for those that I did not have a chance to reply to, please
    accept my apologies. The updated Oracle can be found here :
    http://otn.oracle.com/deploy/security/pdf/2003alert57.pdf . In summary,
    Oracle 9i Database Release 2, Oracle 9i Database Release 1 and Oracle 8i
    Database (8.1.x) are all vulnerable and that "Risk to exposure is high, as a
    valid username and password is not needed in all cases to exploit this
    potential vulnerability."
    Cheers,
    David Litchfield
    NGSSoftware Ltd
    http://www.nextgenss.com/
    +44(0)208 401 0070
    
    NGSSoftware's SQuirrel for Oracle, an advanced security audit tool for
    Oracle, checks for these vulnerabilities. More information is available from
    http://www.nextgenss.com/products/squirrelfororacle.htm .
    



    This archive was generated by hypermail 2b30 : Fri Sep 12 2003 - 09:47:13 PDT