[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Secunia Research: Oracle Outside In Two Buffer Overflow Vulnerabilities



======================================================================



     Secunia Research (now part of Flexera Software) 26/10/2015



       Oracle Outside In Two Buffer Overflow Vulnerabilities



======================================================================

Table of Contents



Affected Software....................................................1

Severity.............................................................2

Description of Vulnerabilities.......................................3

Solution.............................................................4

Time Table...........................................................5

Credits..............................................................6

References...........................................................7

About Secunia........................................................8

Verification.........................................................9



======================================================================



1) Affected Software



* Oracle Outside In versions 8.5.0, 8.5.1, and 8.5.2.



====================================================================== 

2) Severity



Rating: Moderately critical

Impact: System Access

Where:  From remote



====================================================================== 

3) Description of Vulnerabilities



Secunia Research has discovered two vulnerabilities in Oracle Outside

In Technology, which can be exploited by malicious people to cause a

DoS (Denial of Service) and compromise an application using the SDK.



1) An error in the vstga.dll when processing TGA files can be

exploited to cause an out-of-bounds write memory access.



2) An error in the libxwd2.dll when processing XWD files can be

exploited to cause a stack-based buffer overflow.



Successful exploitation of the vulnerabilities may allow execution of

arbitrary code.



====================================================================== 

4) Solution



Apply update. Please see the Oracle Critical Patch Update Advisory

for October 2015 for details.



====================================================================== 

5) Time Table



14/07/2015 - Vendor notified of vulnerabilities.

14/07/2015 - Vendor acknowledges report.

16/07/2015 - Vendor supplied bug ticket ID.

27/07/2015 - Vendor supplied information of fix in main codeline.

24/09/2015 - Replied to vendor and asked about CVE references.

25/09/2015 - Vendor replied that they check our request.

27/09/2015 - Vendor assigned two CVE references.

17/10/2015 - Vendor supplied 20/10/2015 as estimated fix date.

20/10/2015 - Release of vendor patch.

21/10/2015 - Public disclosure.

26/10/2015 - Publication of research advisory.



======================================================================



6) Credits



Discovered by Behzad Najjarpour Jabbari, Secunia Research (now part

of Flexera Software).



======================================================================



7) References



The Common Vulnerabilities and Exposures (CVE) project has assigned

the CVE-2015-4877 and CVE-2015-4878 identifiers for the

vulnerabilities.



======================================================================



8) About Secunia (now part of Flexera Software)



In September 2015, Secunia has been acquired by Flexera Software:



https://secunia.com/blog/435/



Secunia offers vulnerability management solutions to corporate

customers with verified and reliable vulnerability intelligence

relevant to their specific system configuration:



http://secunia.com/advisories/business_solutions/



Secunia also provides a publicly accessible and comprehensive advisory

database as a service to the security community and private

individuals, who are interested in or concerned about IT-security.



http://secunia.com/advisories/



Secunia believes that it is important to support the community and to

do active vulnerability research in order to aid improving the

security and reliability of software in general:



http://secunia.com/secunia_research/



Secunia regularly hires new skilled team members. Check the URL below

to see currently vacant positions:



http://secunia.com/corporate/jobs/



Secunia offers a FREE mailing list called Secunia Security Advisories:



http://secunia.com/advisories/mailing_lists/



======================================================================



9) Verification 



Please verify this advisory by visiting the Secunia website:

http://secunia.com/secunia_research/2015-04/



Complete list of vulnerability reports published by Secunia Research:

http://secunia.com/secunia_research/



======================================================================