Oracle FAQ Your Portal to the Oracle Knowledge Grid
HOME | ASK QUESTION | ADD INFO | SEARCH | E-MAIL US
 

Home -> Community -> Mailing Lists -> Oracle-L -> FW: [Fwd: [ISN] Oracle patches high-risk security hole]

FW: [Fwd: [ISN] Oracle patches high-risk security hole]

From: Boivin, Patrice J <BoivinP_at_mar.dfo-mpo.gc.ca>
Date: Mon, 09 Jul 2001 04:34:48 -0700
Message-ID: <F001.003442A6.20010709043019@fatcity.com>

Fyi

Patrice Boivin
Systems Analyst (Oracle Certified DBA)

Systems Admin & Operations | Admin. et Exploit. des systèmes
Technology Services        | Services technologiques
Informatics Branch         | Direction de l'informatique 
Maritimes Region, DFO      | Région des Maritimes, MPO

E-Mail: boivinp_at_mar.dfo-mpo.gc.ca <mailto:boivinp_at_mar.dfo-mpo.gc.ca>

http://investor.cnet.com/investor/news/newsitem/0-9900-1028-6469566-0.html?t ag=ats
<http://investor.cnet.com/investor/news/newsitem/0-9900-1028-6469566-0.html?
tag=ats>
By: Stephen Shankland
7/5/01 4:40 PM
Source: News.com
Researchers have found a security hole in Oracle's 8i database program that could let an outside attacker take over the software and-in the case of a Windows computer-the entire system. Researchers at Covert Labs, part of Network Associates' PGP Security group, discovered the vulnerability and ranked its risk as "high." Oracle has acknowledged the problem, fixed it in the newest 9i version of its software and issued a patch for the earlier releases.
"This is a pretty significant vulnerability for Oracle users," said Jim Magdych, security research manager for PGP Security. The problem occurs in a part of Oracle's database software called the "listener," which handles communications between people using the database and the database itself, Magdych said. The attack works by sending more information than the software expects, a process called a "buffer overrun." In a buffer overrun attack, the extra characters are written into the computer's memory. A clever attacker can place commands in just the right patch of memory to make the computer's chip run a program that can be used to give access to the attacker, Magdych said. What the attacker does next varies according to what type of system has been compromised. In the case of the Oracle security hole, the attacker would have access privileges to the database itself, granting him permission to view or change any information in the database. Oracle runs with very broad powers on a Windows system, so an attacker there would have complete control over the system, Magdych said. Oracle has narrower powers running under the Unix operating system, but the Oracle permission would be a useful foot in the door for further attacks that could lead to complete control, he said.
Covert Labs has a staff of about six scouring software commonly used on the Internet, Magdych said. Earlier this year, the team discovered several serious problems with Berkeley Internet Name Domain (BIND), widely-used software that links a computer's numerical Internet address with its URL.  

ISN is hosted by SecurityFocus.com

---
To unsubscribe email isn-unsubscribe_at_SecurityFocus.com

<mailto:isn-unsubscribe_at_SecurityFocus.com> .
-- Please see the official ORACLE-L FAQ: http://www.orafaq.com -- Author: Boivin, Patrice J INET: BoivinP_at_mar.dfo-mpo.gc.ca Fat City Network Services -- (858) 538-5051 FAX: (858) 538-5051 San Diego, California -- Public Internet access / Mailing Lists -------------------------------------------------------------------- To REMOVE yourself from this mailing list, send an E-Mail message to: ListGuru_at_fatcity.com (note EXACT spelling of 'ListGuru') and in the message BODY, include a line containing: UNSUB ORACLE-L (or the name of mailing list you want to be removed from). You may also send the HELP command for other information (like subscribing).
Received on Mon Jul 09 2001 - 06:34:48 CDT

Original text of this message

HOME | ASK QUESTION | ADD INFO | SEARCH | E-MAIL US