BugTraq
Update to the Oracle EXTPROC advisory Sep 12 2003 12:30PM
NGSSoftware Insight Security Research (nisr nextgenss com)
Hello,
Please note that Oracle has updated the extproc buffer overrun advisory.
There was some confusion caused because the intial Oracle advisory stated
that a username and password were required to exploit the overflow which was
contrary to the results of our research; we concluded that no user ID or
password was necessary. Whilst I answered many of the mails querying this
discrepancy, for those that I did not have a chance to reply to, please
accept my apologies. The updated Oracle can be found here :
http://otn.oracle.com/deploy/security/pdf/2003alert57.pdf . In summary,
Oracle 9i Database Release 2, Oracle 9i Database Release 1 and Oracle 8i
Database (8.1.x) are all vulnerable and that "Risk to exposure is high, as a
valid username and password is not needed in all cases to exploit this
potential vulnerability."
Cheers,
David Litchfield
NGSSoftware Ltd
http://www.nextgenss.com/
+44(0)208 401 0070

NGSSoftware's SQuirrel for Oracle, an advanced security audit tool for
Oracle, checks for these vulnerabilities. More information is available from
http://www.nextgenss.com/products/squirrelfororacle.htm .

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus