<<< Date Index >>>     <<< Thread Index >>>

[nisr@xxxxxxxxxxxxx: Patch available for multiple critical flaws in Oracle]



----- Forwarded message from NGSSoftware Insight Security Research 
<nisr@xxxxxxxxxxxxx> -----

From: "NGSSoftware Insight Security Research" <nisr@xxxxxxxxxxxxx>
Subject: Patch available for multiple critical flaws in Oracle
To: <bugtraq@xxxxxxxxxxxxxxxxx>, <NTBUGTRAQ@xxxxxxxxxxxxxxxxxxxxxx>,
  <vulnwatch@xxxxxxxxxxxxx>
Date: Tue, 31 Aug 2004 23:08:05 +0100
X-Mailer: Microsoft Outlook Express 6.00.2900.2080
Message-ID: <001b01c48fa6$fde430f0$0200a8c0@GLADIUS>

Researchers at NGSSoftware have discovered multiple critical vulnerabilities 
in Oracle Database Server and Oracle Application Server. Versions affected 
include

Oracle Database 10g Release 1 Version 10.1.0.2
Oracle9i Database Server Release 2, versions 9.2.0.4 and 9.2.0.5
Oracle9i Database Server Release 1, versions 9.0.1.4, 9.0.1.5 and 9.0.4
Oracle8i Database Server Release 3, version 8.1.7.4
Oracle Application Server 10g (9.0.4), versions 9.0.4.0 and 9.0.4.1
Oracle9i Application Server Release 2, versions 9.0.2.3 and 9.0.3.1
Oracle9i Application Server Release 1, version 1.0.2.2

The vulnerabilities range from buffer overflow issues, PL/SQL Injection, 
trigger abuse, character set conversion bugs and denial of service. On the 
31st of August 2004 Oracle released a set of patches to address all of these 
issues (and for other flaws found by other researchers.) This patch set can 
be downloaded from the Metalink website - http://metalink.oracle.com/.

NGSSoftware are going to withhold details about these flaws for three 
months. Full details will be published on the 31st of November 2004. This 
three month window will allow Oracle database administrators the time needed 
to test and apply the patch set before the details are released to the 
general public. This reflects NGSSoftware's new approach to responsible 
disclosure.

NGSSQuirreL for Oracle, NGSSoftware's advanced vulnerability assessment 
scanner and security manager for Oracle, has been updated to check for and 
positively identify these flaws in Oracle database servers on the network. 
More information about NGSSQuirreL for Oracle can be found at 
http://www.nextgenss.com/squirrelora.htm.

NGSSoftware Insight Security Research
http://www.nextgenss.com/
+44(0)208 401 0070 




----- End forwarded message -----

-- 
David Mirza Ahmad
Symantec 

PGP: 0x26005712
8D 9A B1 33 82 3D B3 D0 40 EB  AB F0 1E 67 C6 1A 26 00 57 12