Secunia Security Advisory - Multiple vulnerabilities have been reported in various Oracle products. Some of these vulnerabilities have unknown impacts, while others can be exploited to bypass certain security restrictions, cause a DoS (Denial of Service), conduct cross-site scripting and SQL injection attacks, or potentially compromise a vulnerable system..
f7594422107013c718f4ff693f13e561177051323df8f417767693434f822e5a
----------------------------------------------------------------------
Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
http://corporate.secunia.com/trial/38/request/
----------------------------------------------------------------------
TITLE:
Oracle Products Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA24929
VERIFY ADVISORY:
http://secunia.com/advisories/24929/
CRITICAL:
Highly critical
IMPACT:
Security Bypass, Cross Site Scripting, Manipulation of data, DoS,
System access, Unknown
WHERE:
>From remote
SOFTWARE:
Oracle Database 10.x
http://secunia.com/product/3387/
Oracle9i Database Enterprise Edition
http://secunia.com/product/359/
Oracle9i Database Standard Edition
http://secunia.com/product/358/
Oracle Secure Enterprise Search 10.x
http://secunia.com/product/13978/
Oracle Application Server 10g
http://secunia.com/product/3190/
Oracle Collaboration Suite 10.x
http://secunia.com/product/2450/
Oracle E-Business Suite 11i
http://secunia.com/product/442/
Oracle E-Business Suite 12.x
http://secunia.com/product/13979/
Oracle Enterprise Manager 9.x
http://secunia.com/product/2564/
Oracle PeopleSoft Enterprise Tools 8.x
http://secunia.com/product/9411/
Oracle PeopleSoft Enterprise Human Capital Management 8.x
http://secunia.com/product/13980/
JD Edwards EnterpriseOne Tools 8.x
http://secunia.com/product/5940/
JD Edwards OneWorld Tools 8.x
http://secunia.com/product/2948/
DESCRIPTION:
Multiple vulnerabilities have been reported in various Oracle
products. Some of these vulnerabilities have unknown impacts, while
others can be exploited to bypass certain security restrictions,
cause a DoS (Denial of Service), conduct cross-site scripting and SQL
injection attacks, or potentially compromise a vulnerable system..
Details are available for the following vulnerabilities:
1) The Oracle TNS Listener can be caused to shut down by sending a
"TNS STOP" command to the Oracle Discoverer Servlet.
2) Input passed to the "expType" in
search/admin/sources/boundary_rules.jsp in Oracle Secure Enterprise
Search is not properly sanitised before being returned to the user.
This can be exploited to execute arbitrary HTML and script code in a
user's browser session in context of an affected site.
3) Certain input processed by the DBMS_AQADM_SYS and
DBMS_UPGRADE_INTERNAL packages are not properly sanitised before
being used in SQL queries. These can be exploited to manipulate SQL
queries by injecting arbitary SQL code.
4) It is possible to bypass the Oracle database logon trigger.
SOLUTION:
Apply patches (see the vendor's advisory).
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
* Vicente Aguilera Diaz, Internet Security Auditors, S.L.
* Gerhard Eschelbeck, Qualys, Inc.
* Esteban Martinez Fayo, Application Security, Inc.
* Joxean Koret
* Alexander Kornbrust, Red Database Security GmbH
* David Litchfield and Paul M. Wright, NGSSoftware
* noderat ratty
* TippingPoint's Zero Day Initiative
ORIGINAL ADVISORY:
Oracle:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2007.html
Red Database Security:
http://www.red-database-security.com/advisory/oracle_discoverer_servlet.html
http://www.red-database-security.com/advisory/oracle_css_ses.html
http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aqadm_sys.html
http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_upgrade_internal.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------