Could anyone write a plugin for these flaws ? ----- Forwarded message from Integrigy Security Alerts <alertsat_private> ----- > X-Original-To: renaudat_private > Delivered-To: renaudat_private > Delivered-To: renaudat_private > Mailing-List: contact bugtraq-helpat_private; run by ezmlm > Precedence: bulk > List-Id: <bugtraq.list-id.securityfocus.com> > List-Post: <mailto:bugtraqat_private> > List-Help: <mailto:bugtraq-helpat_private> > List-Unsubscribe: <mailto:bugtraq-unsubscribeat_private> > List-Subscribe: <mailto:bugtraq-subscribeat_private> > Delivered-To: mailing list bugtraqat_private > Delivered-To: moderator for bugtraqat_private > From: "Integrigy Security Alerts" <alertsat_private> > To: <bugtraqat_private> > Subject: Integrigy Security Alert - Oracle E-Business Suite FNDWRR Buffer Overflow > Date: Thu, 24 Jul 2003 11:51:27 -0500 > X-Priority: 3 (Normal) > X-MSMail-Priority: Normal > X-Mailer: Microsoft Outlook, Build 10.0.4510 > X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2800.1165 > Importance: Normal > X-Spam-Status: No, hits=-6.1 required=5.5 > tests=AWL,BAYES_01,KNOWN_MAILING_LIST > version=2.55 > X-Spam-Level: > X-Spam-Checker-Version: SpamAssassin 2.55 (1.174.2.19-2003-05-19-exp) > > > Integrigy Security Alert > ______________________________________________________________________ > > Oracle E-Business Suite FNDWRR Buffer Overflow > July 23, 2003 > ______________________________________________________________________ > > Summary: > > The Oracle Applications FNDWRR CGI program, used to retrieve report output > from the Concurrent Manager server via a web browser, has a remotely > exploitable buffer overflow. A mandatory patch from Oracle is required to > solve this security issue. > > Product: Oracle E-Business Suite > Versions: 11.0 and 11.5.1 - 11.5.8 > Platforms: All platforms > Risk Level: High > ______________________________________________________________________ > > Description: > > The Oracle Applications Web Report Review (FNDWRR) program is used to view > reports and logs in a web browser. FNDWRR is implemented as a CGI program. > The FNDWRR CGI program is named "FNDWRR.exe" on both UNIX and Windows > platforms. > > A buffer overflow exists in the FNDWRR program allowing an attacker to > potentially gain control of the process and execute arbitrary code on the > server. This buffer overflow can be remotely exploited using a web browser > and an overly long URL. > > Solution: > > Oracle has released patches for Oracle Applications 11.0 and 11i to correct > this vulnerability. Oracle has fixed the buffer overflow in the FNDWRR > executable and related libraries. > > The following Oracle patches must be applied -- > > Version Patch > ------- ----- > 11.0 2919943 (All Releases) > 11i 2919943 (11.5.1 - 11.5.8) > > Oracle Applications customers should consider this vulnerability high risk > and apply the above patch during the next maintenance cycle. Customers with > Internet facing application servers should apply the patch immediately. > > Appropriate testing and backups should be performed before applying any > patches. > > Additional Information: > > http://www.integrigy.com/resources.htm > http://otn.oracle.com/deploy/security/pdf/2003alert56.pdf > > For more information or questions regarding this security alert, please > contact us at alertsat_private > > Credit: > > This vulnerability was discovered by Stephen Kost of Integrigy Corporation. > ______________________________________________________________________ > > About Integrigy Corporation (www.integrigy.com) > > Integrigy Corporation is a leader in application security for large > enterprise, mission critical applications. Our application vulnerability > assessment tool, AppSentry, assists companies in securing their largest and > most important applications. Integrigy Consulting offers security assessment > services for leading ERP and CRM applications. > > For more information, visit www.integrigy.com. > > ----- End forwarded message ----- ----- Forwarded message from Integrigy Security Alerts <alertsat_private> ----- > X-Original-To: renaudat_private > Delivered-To: renaudat_private > Delivered-To: renaudat_private > Mailing-List: contact bugtraq-helpat_private; run by ezmlm > Precedence: bulk > List-Id: <bugtraq.list-id.securityfocus.com> > List-Post: <mailto:bugtraqat_private> > List-Help: <mailto:bugtraq-helpat_private> > List-Unsubscribe: <mailto:bugtraq-unsubscribeat_private> > List-Subscribe: <mailto:bugtraq-subscribeat_private> > Delivered-To: mailing list bugtraqat_private > Delivered-To: moderator for bugtraqat_private > From: "Integrigy Security Alerts" <alertsat_private> > To: <bugtraqat_private> > Subject: Integrigy Security Alert - Oracle E-Business Suite AOL/J Setup Test Information Disclosure > Date: Thu, 24 Jul 2003 11:51:27 -0500 > X-Priority: 3 (Normal) > X-MSMail-Priority: Normal > X-Mailer: Microsoft Outlook, Build 10.0.4510 > X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2800.1165 > Importance: Normal > X-Spam-Status: No, hits=-5.5 required=5.5 > tests=AWL,BAYES_10,KNOWN_MAILING_LIST > version=2.55 > X-Spam-Level: > X-Spam-Checker-Version: SpamAssassin 2.55 (1.174.2.19-2003-05-19-exp) > > > Integrigy Security Alert > ______________________________________________________________________ > > Oracle E-Business Suite AOL/J Setup Test Information Disclosure > July 23, 2003 > ______________________________________________________________________ > > Summary: > > The Oracle Applications AOL/J Setup Test Suite, used to trouble-shoot the > Self-Service framework, can be exploited to remotely retrieve sensitive > configuration and host information without application authentication. The > AOL/J Setup Test Suite is installed by default for all 11i implementations. > A mandatory patch from Oracle is required to solve this security issue. > > Product: Oracle E-Business Suite > Versions: 11.5.1 - 11.5.8 > Platforms: All platforms > Risk Level: Low > _____________________________________________________________________ > > Description: > > The Oracle Applications Self-Service Framework (OA Framework) is the > foundation for self-service HRMS, iProcurement, iExpenses, and other web > applications. The OA Framework includes a Test Suite used to verify its > installation and configuration. The AOL/J Setup Test Suite is implemented > as Java Server Pages (JSP) and the main JSP page is "aoljtest.jsp". The > AOL/J Setup Test Suite is installed for all 11i web and forms servers in the > $COMMON_TOP/html/jsp/fnd directory. > > Multiple vulnerabilities exist in the AOL/J Setup Test Suite allowing an > attacker to obtain valuable information on the configuration of Oracle > Applications without any database or application authentication. This > information includes the GUEST user password and application server security > key. > > Solution: > > Oracle has released a patch for the Oracle E-Business Suite 11i to correct > this vulnerability. Oracle has corrected multiple vulnerabilities in the > AOL/J Setup Test Suite JSPs. > > The following Oracle patch must be applied -- > > Version Patch > ------- ----- > 11i 2939083 (11.5.1 - 11.5.8) > > Oracle Applications customers should consider this vulnerability low risk > and apply the above patch during the next normal maintenance cycle. > Customers with Internet facing application servers should apply the patch > immediately or consider removing or restricting access to the AOL/J Setup > Test Suite. In addition, the GUEST user account should be checked to ensure > that it has only publicly accessible responsibilities assigned to it. > > Appropriate testing and backups should be performed before applying any > patches. > > Additional Information: > > http://www.integrigy.com/resources.htm > http://otn.oracle.com/deploy/security/pdf/2003alert55.pdf > > For more information or questions regarding this security alert, please > contact us at alertsat_private > > Credit: > > This vulnerability was discovered by Stephen Kost of Integrigy Corporation. > ______________________________________________________________________ > > About Integrigy Corporation (www.integrigy.com) > > Integrigy Corporation is a leader in application security for large > enterprise, mission critical applications. Our application vulnerability > assessment tool, AppSentry, assists companies in securing their largest and > most important applications. Integrigy Consulting offers security assessment > services for leading ERP and CRM applications. > > For more information, visit www.integrigy.com. > > ----- End forwarded message ----- -- Renaud Deraison The Nessus Project http://www.nessus.org
This archive was generated by hypermail 2b30 : Fri Jul 25 2003 - 06:20:20 PDT