what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

NGS-oracle2.txt

NGS-oracle2.txt
Posted Nov 9, 2005
Site ngssoftware.com

Examining the Oracle October 2005 Critical Patch Update in depth, NGSResearchers discovered a number of problems which have all since been reported to Oracle. As well as new vulnerabilities and problems with the patches for old vulnerabilities, the October 2005 CPU fails to install the patched Oracle Text (CTXSYS) components on Oracle 8.1.7.4 on all operating systems.

tags | advisory, vulnerability
SHA-256 | dcb5911d8865a35e374c4408fe8e0d9825eb68d9a0f3aad29905098199a62c7c

NGS-oracle2.txt

Change Mirror Download
Examining the Oracle October 2005 Critical Patch Update in depth, 
NGSResearchers discovered a number of problems which have all since been
reported to Oracle. As well as new vulnerabilities and problems with the
patches for old vulnerabilities, the October 2005 CPU fails to install the
patched Oracle Text (CTXSYS) components on Oracle 8.1.7.4 on all operating
systems. This is due to a problem with the install sql script: rather than
executing

SELECT DBMS_REGISTRY.SCRIPT('CONTEXT','@ctxcpu.sql')....

the install script executes

SELECT DBMS_REGISTRY.SCRIPT('CTX','@ctxcpu.sql')....

So, even if you have Oracle Text installed the patch installer will not
install the updated PL/SQL packages. The fall out from this means that your
servers may still be vulnerable to the Oracle Text flaws; these allow a low
privileged user to gain DBA privileges. Further, if the RDBMS is part of a
web application that uses Oracle Portal (OAS, IAS, Oracle HTTP Server) then
an attacker may exploit this from the Internet without a userID and
password.

To check if you are still vulnerable execute the following query

select owner,package_name,object_name from all_arguments where owner =
'CTXSYS' and package_name = 'DRILOAD' and object_name = 'VALIDATE_STMT';

If no row is returned then you are not vulnerable but if a row is returned
then you are vulnerable. In this case you should manually apply the
ctxcpu.sql script.

NGSSQuirreL for Oracle, the leading vulnerability assessment scanner for
Oracle RDBMSes, checks for these problems as well as the other many issues
that still afflict Oracle. More information about NGSSQuirreL can be found
here - http://www.ngssoftware.com/squirrelora.htm

Cheers,
The NGSResearch Team


Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close