The following Oracle applications are affected:
Oracle’s Collaboration Suite and E-Business Suite 11i contain some of the
vulnerable components and are also affected.
According to Oracle, the following product releases and versions, and
all future releases and versions are not affected:
Several vulnerabilities exist in the Oracle Database Server, Application
Server, and Enterprise Manager software. The most serious vulnerabilities
could allow a remote attacker to execute arbitrary code on an affected
system. Oracle’s Collaboration Suite and E-Business Suite 11i contain the
vulnerable software and are affected as well.
Several vulnerabilities have been reported in Oracle’s Database Server,
Application Server, and Enterprise Manager software. According to reports,
several buffer overflow, format string, SQL injection and other types of
vulnerabilities were discovered and reported to Oracle.
Oracle has released Oracle
Security Alert #68 (pdf) to address these vulnerabilities.
We are tracking them as follows:
VU#170830 –
Oracle Enterprise Manager contains several vulnerabilitiesVU#316206 –
Oracle Database Server contains several vulnerabilitiesVU#435974 –
Oracle Application Server contains several vulnerabilities
As more information becomes available, we will update these
vulnerability notes as appropriate.
The impacts of the vulnerabilities described above are unclear.
According to credible reports, the impacts of these vulnerabilities
range from the remote, unauthenticated execution of arbitrary code to data
corruption or leakage.
Apply the appropriate patch or upgrade as specified in the Oracle
Security Alert #68 (pdf).
Organizations that use Oracle’s Collaboration Suite or E-Business Suite
11i should see Oracle
Security Alert #68 (pdf) for remediation instructions.
US-CERT thanks all the parties involved in researching and reporting these
vulnerabilities. Specifically, Oracle credits the people for discovering
these issues: Cesar Cerrudo, Pete Finnigan, Jonathan Gennick, Alexander
Kornbrust of Red Database Security, Stephen Kost of Integrigy, David
Litchfield of NGSS Limited, Matt Moore of PenTest Limited, Aaron Newman of
Application Security Inc., Andy Rees of QinetiQ, Christian Schaller of
Siemens CERT.
Feedback can be directed to the author:
Jason
A. Rafail.
Sep 1, 2004: Initial release
Sep 3, 2004: Updated Credits
Systems Affected Systems running Microsoft Office XP and Outlook 2002 Overview There…
Systems Affected Applications and systems that use the OpenSSL SSL/TLS library Overview …
Systems Affected Continuing Threats to Home Users View Previous Alerts Alert (SA04-079A) Continuing Threats…
Systems Affected Microsoft Windows systems Overview A cross-domain vulnerability in the Outlook…
Systems Affected Systems running Microsoft Windows Overview There are multiple vulnerabilities in…
Systems Affected Microsoft Windows Operating Systems Microsoft Windows Remote Procedure Call (RPC) and Distributed…
This website uses cookies.