Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Database)  >   Oracle Database Vendors:   Oracle
Oracle Database Bugs Let Remote Authenticated Users Access and Modify Data and Remote Users Cause Denial of Service Conditions
SecurityTracker Alert ID:  1022052
SecurityTracker URL:
CVE Reference:   CVE-2009-0972, CVE-2009-0973, CVE-2009-0975, CVE-2009-0976, CVE-2009-0977, CVE-2009-0978, CVE-2009-0979, CVE-2009-0980, CVE-2009-0981, CVE-2009-0984, CVE-2009-0985, CVE-2009-0986, CVE-2009-0988, CVE-2009-0991, CVE-2009-0992, CVE-2009-0997   (Links to External Site)
Date:  Apr 14 2009
Impact:   Denial of service via network, Disclosure of user information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s):,,,; and prior versions
Description:   Several vulnerabilities were reported in Oracle Database. A remote authenticated user can access and modify data on the target system. A remote user can cause denial of service conditions.

A remote authenticated user can exploit unspecified vulnerabilities to affect the confidentiality and integrity of data on the target system.

A remote user can affect the availability of the target system.

No details were provided.

The following versions are affected:

- Oracle Database 11g, version,
- Oracle Database 10g Release 2, versions,
- Oracle Database 10g, version
- Oracle Database 9i Release 2, versions,

The Advanced Queuing [CVE-2009-0977, CVE-2009-0992], Application Express [CVE-2009-0981], Cluster Ready Services [CVE-2009-0973], Core RDBMS [CVE-2009-0985], Database Vault [CVE-2009-0984, CVE-2009-0997], Listener [CVE-2009-0991], Password Policy [CVE-2009-0988], Resource Manager [CVE-2009-0979], SQLX Functions [CVE-2009-0980], and Workspace Manager [CVE-2009-0972, CVE-2009-0975, CVE-2009-0976, CVE-2009-0978, CVE-2009-0986] components are affected.

The following researchers reported these and other Oracle vulnerabilities:

Dyon Balding of Secunia Research; Joshua J. Drake of iDefense; Gerhard Eschelbeck of Qualys, Inc.; Esteban Martinez Fayo of Application Security, Inc.; Franz Huell of Red Database Security; Mike Janowski of Neohapsis, Inc.; Joxean Koret; Joxean Koret of TippingPoint (3com); Alexander Kornbrust of Red Database Security; David Litchfield of NGS Software; Tanel Poder; Sven Vetter of Trivadis; and Dennis Yurichev.

Impact:   A remote authenticated user can access and modify data on the target system.

A remote user can cause denial of service conditions.

Solution:   The vendor has issued a fix, described in their April 2009 Critical Patch Update advisory.

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), UNIX (Tru64), Windows (NT), Windows (2000), Windows (2003), Windows (XP)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC