<<< Date Index >>>     <<< Thread Index >>>

Patch available for multiple critical flaws in Oracle



Researchers at NGSSoftware have discovered multiple critical vulnerabilities in Oracle Database Server and Oracle Application Server. Versions affected include

Oracle Database 10g Release 1 Version 10.1.0.2
Oracle9i Database Server Release 2, versions 9.2.0.4 and 9.2.0.5
Oracle9i Database Server Release 1, versions 9.0.1.4, 9.0.1.5 and 9.0.4
Oracle8i Database Server Release 3, version 8.1.7.4
Oracle Application Server 10g (9.0.4), versions 9.0.4.0 and 9.0.4.1
Oracle9i Application Server Release 2, versions 9.0.2.3 and 9.0.3.1
Oracle9i Application Server Release 1, version 1.0.2.2

The vulnerabilities range from buffer overflow issues, PL/SQL Injection, trigger abuse, character set conversion bugs and denial of service. On the 31st of August 2004 Oracle released a set of patches to address all of these issues (and for other flaws found by other researchers.) This patch set can be downloaded from the Metalink website - http://metalink.oracle.com/.

NGSSoftware are going to withhold details about these flaws for three months. Full details will be published on the 31st of November 2004. This three month window will allow Oracle database administrators the time needed to test and apply the patch set before the details are released to the general public. This reflects NGSSoftware's new approach to responsible disclosure.

NGSSQuirreL for Oracle, NGSSoftware's advanced vulnerability assessment scanner and security manager for Oracle, has been updated to check for and positively identify these flaws in Oracle database servers on the network. More information about NGSSQuirreL for Oracle can be found at http://www.nextgenss.com/squirrelora.htm.

NGSSoftware Insight Security Research
http://www.nextgenss.com/
+44(0)208 401 0070