[Fwd: Integrigy Security Alert - Oracle E-Business Suite FNDWRR Buffer Overflow]

From: Renaud Deraison (deraisonat_private)
Date: Fri Jul 25 2003 - 06:19:06 PDT

  • Next message: Paul Johnston: "Help writing new plugins!!"

    Could anyone write a plugin for these flaws ?
    
    
    ----- Forwarded message from Integrigy Security Alerts <alertsat_private> -----
    
    > X-Original-To: renaudat_private
    > Delivered-To: renaudat_private
    > Delivered-To: renaudat_private
    > Mailing-List: contact bugtraq-helpat_private; run by ezmlm
    > Precedence: bulk
    > List-Id: <bugtraq.list-id.securityfocus.com>
    > List-Post: <mailto:bugtraqat_private>
    > List-Help: <mailto:bugtraq-helpat_private>
    > List-Unsubscribe: <mailto:bugtraq-unsubscribeat_private>
    > List-Subscribe: <mailto:bugtraq-subscribeat_private>
    > Delivered-To: mailing list bugtraqat_private
    > Delivered-To: moderator for bugtraqat_private
    > From: "Integrigy Security Alerts" <alertsat_private>
    > To: <bugtraqat_private>
    > Subject: Integrigy Security Alert - Oracle E-Business Suite FNDWRR Buffer Overflow
    > Date: Thu, 24 Jul 2003 11:51:27 -0500
    > X-Priority: 3 (Normal)
    > X-MSMail-Priority: Normal
    > X-Mailer: Microsoft Outlook, Build 10.0.4510
    > X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2800.1165
    > Importance: Normal
    > X-Spam-Status: No, hits=-6.1 required=5.5
    > 	tests=AWL,BAYES_01,KNOWN_MAILING_LIST
    > 	version=2.55
    > X-Spam-Level: 
    > X-Spam-Checker-Version: SpamAssassin 2.55 (1.174.2.19-2003-05-19-exp)
    > 
    > 
    > Integrigy Security Alert
    > ______________________________________________________________________
    > 
    > Oracle E-Business Suite FNDWRR Buffer Overflow
    > July 23, 2003
    > ______________________________________________________________________
    > 
    > Summary:
    > 
    > The Oracle Applications FNDWRR CGI program, used to retrieve report output
    > from the Concurrent Manager server via a web browser, has a remotely
    > exploitable buffer overflow.  A mandatory patch from Oracle is required to
    > solve this security issue.
    > 
    > Product:    Oracle E-Business Suite
    > Versions:   11.0 and 11.5.1 - 11.5.8
    > Platforms:  All platforms
    > Risk Level: High
    > ______________________________________________________________________
    > 
    > Description:
    > 
    > The Oracle Applications Web Report Review (FNDWRR) program is used to view
    > reports and logs in a web browser.  FNDWRR is implemented as a CGI program.
    > The FNDWRR CGI program is named "FNDWRR.exe" on both UNIX and Windows
    > platforms.
    > 
    > A buffer overflow exists in the FNDWRR program allowing an attacker to
    > potentially gain control of the process and execute arbitrary code on the
    > server.  This buffer overflow can be remotely exploited using a web browser
    > and an overly long URL.
    > 
    > Solution:
    > 
    > Oracle has released patches for Oracle Applications 11.0 and 11i to correct
    > this vulnerability.  Oracle has fixed the buffer overflow in the FNDWRR
    > executable and related libraries.
    > 
    > The following Oracle patches must be applied --
    > 
    >       Version     Patch
    >       -------     -----
    >       11.0        2919943     (All Releases)
    >       11i         2919943     (11.5.1 - 11.5.8)
    > 
    > Oracle Applications customers should consider this vulnerability high risk
    > and apply the above patch during the next maintenance cycle.  Customers with
    > Internet facing application servers should apply the patch immediately.
    > 
    > Appropriate testing and backups should be performed before applying any
    > patches.
    > 
    > Additional Information:
    > 
    >   http://www.integrigy.com/resources.htm
    >   http://otn.oracle.com/deploy/security/pdf/2003alert56.pdf
    > 
    > For more information or questions regarding this security alert, please
    > contact us at alertsat_private
    > 
    > Credit:
    > 
    > This vulnerability was discovered by Stephen Kost of Integrigy Corporation.
    > ______________________________________________________________________
    > 
    > About Integrigy Corporation (www.integrigy.com)
    > 
    > Integrigy Corporation is a leader in application security for large
    > enterprise, mission critical applications. Our application vulnerability
    > assessment tool, AppSentry, assists companies in securing their largest and
    > most important applications. Integrigy Consulting offers security assessment
    > services for leading ERP and CRM applications.
    > 
    > For more information, visit www.integrigy.com.
    > 
    > 
    
    ----- End forwarded message -----
    ----- Forwarded message from Integrigy Security Alerts <alertsat_private> -----
    
    > X-Original-To: renaudat_private
    > Delivered-To: renaudat_private
    > Delivered-To: renaudat_private
    > Mailing-List: contact bugtraq-helpat_private; run by ezmlm
    > Precedence: bulk
    > List-Id: <bugtraq.list-id.securityfocus.com>
    > List-Post: <mailto:bugtraqat_private>
    > List-Help: <mailto:bugtraq-helpat_private>
    > List-Unsubscribe: <mailto:bugtraq-unsubscribeat_private>
    > List-Subscribe: <mailto:bugtraq-subscribeat_private>
    > Delivered-To: mailing list bugtraqat_private
    > Delivered-To: moderator for bugtraqat_private
    > From: "Integrigy Security Alerts" <alertsat_private>
    > To: <bugtraqat_private>
    > Subject: Integrigy Security Alert - Oracle E-Business Suite AOL/J Setup Test Information Disclosure
    > Date: Thu, 24 Jul 2003 11:51:27 -0500
    > X-Priority: 3 (Normal)
    > X-MSMail-Priority: Normal
    > X-Mailer: Microsoft Outlook, Build 10.0.4510
    > X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2800.1165
    > Importance: Normal
    > X-Spam-Status: No, hits=-5.5 required=5.5
    > 	tests=AWL,BAYES_10,KNOWN_MAILING_LIST
    > 	version=2.55
    > X-Spam-Level: 
    > X-Spam-Checker-Version: SpamAssassin 2.55 (1.174.2.19-2003-05-19-exp)
    > 
    > 
    > Integrigy Security Alert
    > ______________________________________________________________________
    > 
    > Oracle E-Business Suite AOL/J Setup Test Information Disclosure
    > July 23, 2003
    > ______________________________________________________________________
    > 
    > Summary:
    > 
    > The Oracle Applications AOL/J Setup Test Suite, used to trouble-shoot the
    > Self-Service framework, can be exploited to remotely retrieve sensitive
    > configuration and host information without application authentication.  The
    > AOL/J Setup Test Suite is installed by default for all 11i implementations.
    > A mandatory patch from Oracle is required to solve this security issue.
    > 
    > Product:    Oracle E-Business Suite
    > Versions:   11.5.1 - 11.5.8
    > Platforms:  All platforms
    > Risk Level: Low
    > _____________________________________________________________________
    > 
    > Description:
    > 
    > The Oracle Applications Self-Service Framework (OA Framework) is the
    > foundation for self-service HRMS, iProcurement, iExpenses, and other web
    > applications.  The OA Framework includes a Test Suite used to verify its
    > installation and configuration.  The AOL/J Setup Test Suite is implemented
    > as Java Server Pages (JSP) and the main JSP page is "aoljtest.jsp".  The
    > AOL/J Setup Test Suite is installed for all 11i web and forms servers in the
    > $COMMON_TOP/html/jsp/fnd directory.  
    > 
    > Multiple vulnerabilities exist in the AOL/J Setup Test Suite allowing an
    > attacker to obtain valuable information on the configuration of Oracle
    > Applications without any database or application authentication.  This
    > information includes the GUEST user password and application server security
    > key.
    > 
    > Solution:
    > 
    > Oracle has released a patch for the Oracle E-Business Suite 11i to correct
    > this vulnerability.  Oracle has corrected multiple vulnerabilities in the
    > AOL/J Setup Test Suite JSPs.
    > 
    > The following Oracle patch must be applied --
    > 
    >       Version     Patch
    >       -------     -----
    >       11i         2939083     (11.5.1 - 11.5.8)
    > 
    > Oracle Applications customers should consider this vulnerability low risk
    > and apply the above patch during the next normal maintenance cycle.
    > Customers with Internet facing application servers should apply the patch
    > immediately or consider removing or restricting access to the AOL/J Setup
    > Test Suite.  In addition, the GUEST user account should be checked to ensure
    > that it has only publicly accessible responsibilities assigned to it.
    > 
    > Appropriate testing and backups should be performed before applying any
    > patches.
    > 
    > Additional Information:
    > 
    >   http://www.integrigy.com/resources.htm
    >   http://otn.oracle.com/deploy/security/pdf/2003alert55.pdf
    > 
    > For more information or questions regarding this security alert, please
    > contact us at alertsat_private
    > 
    > Credit:
    > 
    > This vulnerability was discovered by Stephen Kost of Integrigy Corporation.
    > ______________________________________________________________________
    > 
    > About Integrigy Corporation (www.integrigy.com)
    > 
    > Integrigy Corporation is a leader in application security for large
    > enterprise, mission critical applications. Our application vulnerability
    > assessment tool, AppSentry, assists companies in securing their largest and
    > most important applications. Integrigy Consulting offers security assessment
    > services for leading ERP and CRM applications.
    > 
    > For more information, visit www.integrigy.com.
    > 
    > 
    
    ----- End forwarded message -----
    
    -- 
    Renaud Deraison
    The Nessus Project
    http://www.nessus.org
    



    This archive was generated by hypermail 2b30 : Fri Jul 25 2003 - 06:20:20 PDT