[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

FW: UNIRAS Brief - 581/03 -CIAC BULLETIN O-013 - Buffer Overflow in Oracle Binary



 
-----BEGIN PGP SIGNED MESSAGE-----



- -----Original Message-----
From: UNIRAS (UK Govt CERT) [mailto:uniras@xxxxxxxxxxxx]
Sent: 22 October 2003 13:56
To: uniras@xxxxxxxxxxxx
Cc: interim@xxxxxxxxxxxx
Subject: UNIRAS Brief - 581/03 -CIAC BULLETIN O-013 - Buffer Overflow in
Oracle Binary


 
- -----BEGIN PGP SIGNED MESSAGE-----

- - ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 581/03 dated 22.10.03  Time: 13:55
 UNIRAS is part of NISCC(National Infrastructure Security Co-ordination Centre)
- - ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- - ----------------------------------------------------------------------------------

Title
=====
Buffer Overflow in Oracle Binary.

Detail
====== 
A malicious local user may run code of their choice on the server machine.
An interim (one-off) patch for this issue will soon be available. 

- - -----------------------------------------------------------------------------------

             __________________________________________________________

                       The U.S. Department of Energy
                   Computer Incident Advisory Capability
                           ___  __ __    _     ___
                          /       |     /_\   /
                          \___  __|__  /   \  \___
             __________________________________________________________

                             INFORMATION BULLETIN

                        Buffer Overflow in Oracle Binary
                          [Oracle Security Alert #59]

October 21, 2003 17:00 GMT                                        Number O-013
______________________________________________________________________________
PROBLEM:       A malicious local user may run code of their choice on the 
               server machine. 
PLATFORM:      All supported UNIX and Linux operating system variants 
               Oracle 9i/Database Release 2, Version 9.2.x 
               Oracle 9i/Database Release 1, Version 9.0.x 
               Oracle 8i/Database Release 8.1.x 
DAMAGE:        This buffer overflow may allow a malicious local user to run 
               code of their choice as the owner and group of these binaries, 
               typically the "oracle" user, and the "dba" group. 
SOLUTION:      Implement the workaround. 
               Note--an interim (one-off) patch for this issue will soon be 
               available. We will update this bulletin when the patch becomes 
               available. 
______________________________________________________________________________
VULNERABILITY  The risk is LOW. A local user must have a valid account on the 
ASSESSMENT:    operating system hosting the Oracle Database server. 
______________________________________________________________________________
LINKS: 
 CIAC BULLETIN:      http://www.ciac.org/ciac/bulletins/o-013.shtml 
 ORIGINAL BULLETIN:  http://otn.oracle.com/deploy/security/pdf/2003Alert59.pdf 

______________________________________________________________________________
For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via EMail to:
uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 20 7821 1330 Ext 4511
Fax: +44 (0) 20 7821 1686

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 20 7821 1330 and follow the prompts

- - ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of CIAC for the information
contained in this Briefing. 
- - ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- - ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>
- -----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBP5Z+copao72zK539AQELrgP8CFMt2j2jdQzPFljgref6tF4+Md7H+bSC
UN7S8+OBA3oCnQm34SkB/iSUpgSSiFsh+9EWZXL3+4bGUl5M5b1gifnKAejrk+Td
8XXQLE5/HD2tvd3MNjSkZxsjC6VNBuFOS6K0z32d1bowOX+zUhDDQc/4l1sbM3NP
1fFjO1zJgM4=
=+Uhd
- -----END PGP SIGNATURE-----

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBP5acfIpao72zK539AQFBMwP+PS4zC2HZpeP4aVR/i9UIr68NLDVECMSW
0DvKrBg/+hyExpoad/9dCqym/5pom2tsFESxy56T//f7Oypx6KHiKKUZW+Pdr7qR
u5Yh5KHiVqhMFQRsHyTWcCNgbTMIxTQpyQ0MSc3yMPbLTLtLPq7mxKvoap3Y40I0
P5xxtW/smHg=
=DCGm
-----END PGP SIGNATURE-----