what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 24929

Secunia Security Advisory 24929
Posted Apr 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in various Oracle products. Some of these vulnerabilities have unknown impacts, while others can be exploited to bypass certain security restrictions, cause a DoS (Denial of Service), conduct cross-site scripting and SQL injection attacks, or potentially compromise a vulnerable system..

tags | advisory, denial of service, vulnerability, xss, sql injection
SHA-256 | f7594422107013c718f4ff693f13e561177051323df8f417767693434f822e5a

Secunia Security Advisory 24929

Change Mirror Download


----------------------------------------------------------------------

Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
http://corporate.secunia.com/trial/38/request/

----------------------------------------------------------------------

TITLE:
Oracle Products Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA24929

VERIFY ADVISORY:
http://secunia.com/advisories/24929/

CRITICAL:
Highly critical

IMPACT:
Security Bypass, Cross Site Scripting, Manipulation of data, DoS,
System access, Unknown

WHERE:
>From remote

SOFTWARE:
Oracle Database 10.x
http://secunia.com/product/3387/
Oracle9i Database Enterprise Edition
http://secunia.com/product/359/
Oracle9i Database Standard Edition
http://secunia.com/product/358/
Oracle Secure Enterprise Search 10.x
http://secunia.com/product/13978/
Oracle Application Server 10g
http://secunia.com/product/3190/
Oracle Collaboration Suite 10.x
http://secunia.com/product/2450/
Oracle E-Business Suite 11i
http://secunia.com/product/442/
Oracle E-Business Suite 12.x
http://secunia.com/product/13979/
Oracle Enterprise Manager 9.x
http://secunia.com/product/2564/
Oracle PeopleSoft Enterprise Tools 8.x
http://secunia.com/product/9411/
Oracle PeopleSoft Enterprise Human Capital Management 8.x
http://secunia.com/product/13980/
JD Edwards EnterpriseOne Tools 8.x
http://secunia.com/product/5940/
JD Edwards OneWorld Tools 8.x
http://secunia.com/product/2948/

DESCRIPTION:
Multiple vulnerabilities have been reported in various Oracle
products. Some of these vulnerabilities have unknown impacts, while
others can be exploited to bypass certain security restrictions,
cause a DoS (Denial of Service), conduct cross-site scripting and SQL
injection attacks, or potentially compromise a vulnerable system..

Details are available for the following vulnerabilities:

1) The Oracle TNS Listener can be caused to shut down by sending a
"TNS STOP" command to the Oracle Discoverer Servlet.

2) Input passed to the "expType" in
search/admin/sources/boundary_rules.jsp in Oracle Secure Enterprise
Search is not properly sanitised before being returned to the user.
This can be exploited to execute arbitrary HTML and script code in a
user's browser session in context of an affected site.

3) Certain input processed by the DBMS_AQADM_SYS and
DBMS_UPGRADE_INTERNAL packages are not properly sanitised before
being used in SQL queries. These can be exploited to manipulate SQL
queries by injecting arbitary SQL code.

4) It is possible to bypass the Oracle database logon trigger.

SOLUTION:
Apply patches (see the vendor's advisory).

PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
* Vicente Aguilera Diaz, Internet Security Auditors, S.L.
* Gerhard Eschelbeck, Qualys, Inc.
* Esteban Martinez Fayo, Application Security, Inc.
* Joxean Koret
* Alexander Kornbrust, Red Database Security GmbH
* David Litchfield and Paul M. Wright, NGSSoftware
* noderat ratty
* TippingPoint's Zero Day Initiative

ORIGINAL ADVISORY:
Oracle:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2007.html

Red Database Security:
http://www.red-database-security.com/advisory/oracle_discoverer_servlet.html
http://www.red-database-security.com/advisory/oracle_css_ses.html
http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aqadm_sys.html
http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_upgrade_internal.html

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close