Secunia Security Advisory - Some vulnerabilities have been reported in Oracle Application Server, which can be exploited by malicious, local users to disclose sensitive information and by malicious people to disclose potentially sensitive information or manipulate certain data.
b78dd8c289bcd4b1861e4281fd64c52675a35c3c1d2d237cb133d0030c4b963b
----------------------------------------------------------------------
Accurate Vulnerability Scanning
No more false positives, no more false negatives
http://secunia.com/vulnerability_scanning/
----------------------------------------------------------------------
TITLE:
Oracle Application Server Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA38034
VERIFY ADVISORY:
http://secunia.com/advisories/38034/
DESCRIPTION:
Some vulnerabilities have been reported in Oracle Application Server,
which can be exploited by malicious, local users to disclose sensitive
information and by malicious people to disclose potentially sensitive
information or manipulate certain data.
1) An error in the Access Manager Identity Server can be exploited to
manipulate certain data.
2) An error in the Oracle Containers for J2EE component can be
exploited to disclose potentially sensitive information.
3) An error in the Oracle Containers for J2EE component can be
exploited to manipulate certain data.
4) An error in the Unzip component can be exploited by authenticated,
local users to disclose potentially sensitive information.
The vulnerabilities are reported in the following products and
versions:
* Oracle Application Server 10g Release 3 (10.1.3) versions
10.1.3.4.0, 10.1.3.5, and 10.1.3.5.1
* Oracle Application Server 10g Release 2 (10.1.2) version
10.1.2.3.0
* Oracle Access Manager versions 7.0.4.3, 10.1.4.2
SOLUTION:
Apply patches (please see the vendor's advisory for details).
PROVIDED AND/OR DISCOVERED BY:
For the vulnerabilities fixed in the January Critical Patch Update,
the vendor credits:
* Esteban Martinez Fayo, Application Security, Inc.
* Alexander Kornbrust, Red Database Security
* David Litchfield, NGS Software
* Brian Martin, INS.com
* Guy Pilosof, Sentrigo
* JPCERT/CC Vulnerability Handling Team
* Daiki Fukumori [Secure Sky Technology], JPCERT/CC Vulnerability
Handling Team
* Dennis Yurichev
ORIGINAL ADVISORY:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2010.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------