Affected systems
The following Oracle applications are affected:
- Oracle Database 10g version 1, release 10.1.0.2
- Oracle9i Database Server version 2, versions 9.2.0.4 and 9.2.0.5
- Oracle9i Database Server version 1, versions 9.0.1.4, 9.0.1.5 and 9.0.4
- Oracle8i Database Server version 3, version 8.1.7.4
- Oracle Enterprise Manager Grid Control 10g, release 10.1.0.2
- Oracle Enterprise Manager 10g Database Control, Release 10.1.0.2
- Oracle Application Server 10g (9.0.4), versions 9.0.4.0 and 9.0.4.1
- Oracle9i Application Server version 2, versions 9.0.2.3 and 9.0.3.1
- Oracle9i Application Server version 1, version 1.0.2.2
Oracle’s Collaboration Suite and E-Business Suite 11i solutions contain some of the
vulnerable components and are also affected.
According to Oracle, the following product releases and releases, and
all future versions are not affected:
- Oracle Database 10g version 1, release 10.1.0.3
- Oracle Enterprise Manager Grid Control 10g, version 10.1.0.3 (not yet
available) - Oracle Application Server 10g (9.0.4), version 9.0.4.2 (not yet
available)
Preview
Multiple vulnerabilities exist in Oracle Database Server, Application
Server software and Enterprise Manager. The most serious vulnerabilities
could allow a remote attacker to execute arbitrary code on a
system. Oracle’s Collaboration Suite and E-Business Suite 11i solutions contain the
vulnerable software and are also affected.
Description
Several vulnerabilities have been reported in Oracle’s database server,
Application Server and Enterprise Manager software. According to reports,
multiple buffer overflows, string formatting, SQL injection and other types of
vulnerabilities have been discovered and reported to Oracle.
Oracle released Oracle
Security Alert #68 (pdf) to address these vulnerabilities.
We follow them as follows:
VIEW#170830 –
Oracle Enterprise Manager contains several vulnerabilitiesVIEW#316206 –
Oracle Database Server contains several vulnerabilitiesVIEW#435974 –
Oracle Application Server contains several vulnerabilities
As more information becomes available, we will update these
vulnerability notes, if applicable.
Impact
The impacts of the vulnerabilities described above are unclear.
According to credible reports, the impacts of these vulnerabilities
range from remote, unauthenticated execution of arbitrary code to data
corruption or leakage.
Solution
Apply a patch or upgrade
Apply the appropriate patch or upgrade as specified in the Oracle
Security Alert #68 (pdf).
Organizations that use Oracle Collaboration Suite or E-Business Suite
11 I should see Oracle
Security Alert #68 (pdf) for remediation instructions.
Appendix A. References
US-CERT thanks all parties involved in researching and reporting these
vulnerabilities. Specifically, Oracle thanks people for discovering
these numbers: Cesar Cerrudo, Pete Finnigan, Jonathan Gennick, Alexander
Kornbrust of Red Database Security, Stephen Kost of Integrigy, David
Litchfield of NGSS Limited, Matt Moore of PenTest Limited, Aaron Newman of
Application Security Inc., Andy Rees of QinetiQ, Christian Schaller of
SiemensCERT.
Comments can be addressed to the author:
Jason
A. Rafaïl.
Revision history
-
September 1, 2004: initial version
September 3, 2004: credits updated
Last update





