Oracle FAQ Your Portal to the Oracle Knowledge Grid
HOME | ASK QUESTION | ADD INFO | SEARCH | E-MAIL US
 

Home -> Community -> Mailing Lists -> Oracle-L -> RE: [VulnWatch] Patch available for multiple critical flaws in Oracle

RE: [VulnWatch] Patch available for multiple critical flaws in Oracle

From: Ruth Gramolini <rgramolini_at_tax.state.vt.us>
Date: Wed, 1 Sep 2004 09:19:46 -0400
Message-ID: <004b01c49026$59d38d50$8459000a@vttaxnet.tax.state.vt.us>


Thanks! I will also forward this to the list.

Ruth

-----Original Message-----

From: Claus Lund [mailto:clund_at_tax.state.vt.us] Sent: Wednesday, September 01, 2004 7:44 AM To: Ruth Gramolini
Subject: FW: [VulnWatch] Patch available for multiple critical flaws in Oracle

just FYI in case you haven't already received notifications about this...

-Claus

-----Original Message-----

From: NGSSoftware Insight Security Research [mailto:nisr_at_nextgenss.com] Sent: Tuesday, August 31, 2004 6:08 PM
To: bugtraq_at_securityfocus.com; NTBUGTRAQ_at_LISTSERV.NTBUGTRAQ.COM; vulnwatch_at_vulnwatch.org
Subject: [VulnWatch] Patch available for multiple critical flaws in Oracle

Researchers at NGSSoftware have discovered multiple critical vulnerabilities in Oracle Database Server and Oracle Application Server. Versions affected include

Oracle Database 10g Release 1 Version 10.1.0.2

Oracle9i Database Server Release 2, versions 9.2.0.4 and 9.2.0.5
Oracle9i Database Server Release 1, versions 9.0.1.4, 9.0.1.5 and 9.0.4
Oracle8i Database Server Release 3, version 8.1.7.4
Oracle Application Server 10g (9.0.4), versions 9.0.4.0 and 9.0.4.1
Oracle9i Application Server Release 2, versions 9.0.2.3 and 9.0.3.1 Oracle9i Application Server Release 1, version 1.0.2.2

The vulnerabilities range from buffer overflow issues, PL/SQL Injection, trigger abuse, character set conversion bugs and denial of service. On the 31st of August 2004 Oracle released a set of patches to address all of these issues (and for other flaws found by other researchers.) This patch set can be downloaded from the Metalink website - http://metalink.oracle.com/.

NGSSoftware are going to withhold details about these flaws for three months. Full details will be published on the 31st of November 2004. This three month window will allow Oracle database administrators the time needed to test and apply the patch set before the details are released to the general public. This reflects NGSSoftware's new approach to responsible disclosure.

NGSSQuirreL for Oracle, NGSSoftware's advanced vulnerability assessment scanner and security manager for Oracle, has been updated to check for and positively identify these flaws in Oracle database servers on the network. More information about NGSSQuirreL for Oracle can be found at http://www.nextgenss.com/squirrelora.htm.

NGSSoftware Insight Security Research
http://www.nextgenss.com/
+44(0)208 401 0070



Please see the official ORACLE-L FAQ: http://www.orafaq.com

To unsubscribe send email to: oracle-l-request_at_freelists.org put 'unsubscribe' in the subject line.
--

Archives are at http://www.freelists.org/archives/oracle-l/ FAQ is at http://www.freelists.org/help/fom-serve/cache/1.html
Received on Wed Sep 01 2004 - 08:37:25 CDT

Original text of this message

HOME | ASK QUESTION | ADD INFO | SEARCH | E-MAIL US