SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Database)  >   Oracle Database Vendors:   Oracle
Oracle Database Flaws Let Remote Users Take Fully Control of the Database or System
SecurityTracker Alert ID:  1023057
SecurityTracker URL:  http://securitytracker.com/id/1023057
CVE Reference:   CVE-2009-1007, CVE-2009-1018, CVE-2009-1964, CVE-2009-1965, CVE-2009-1971, CVE-2009-1972, CVE-2009-1979, CVE-2009-1985, CVE-2009-1991, CVE-2009-1992, CVE-2009-1993, CVE-2009-1994, CVE-2009-1995, CVE-2009-1997, CVE-2009-2000, CVE-2009-2001   (Links to External Site)
Date:  Oct 20 2009
Impact:   User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 9.2.0.8, 10.1.0.5, 10.2.0.4, 11.1.0.7; and prior versions
Description:   Several vulnerabilities were reported in Oracle Database. A remote user can take full control of the target database.

On Windows-based systems, a remote user can take full control of the target database. On Linux- and UNIX-based systems, a remote user can partially affect the confidentiality, integrity, and availability of the target database.

On all platforms, a remote authenticated user can partially affect the confidentiality, integrity, and availability of the target database.

No additional details were provided.

The following versions are affected:

Oracle Database 11g, version 11.1.0.7
Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4
Oracle Database 10g, version 10.1.0.5
Oracle Database 9i Release 2, versions 9.2.0.8, 9.2.0.8DV

The Advanced Queuing [CVE-2009-1995], Application Express [CVE-2009-1993], Auditing [CVE-2009-1972], Authentication [CVE-2009-1997, CVE-2009-2000], CORE RDBMS [CVE-2009-1992], Data Mining [CVE-2009-1007], Net Foundation Layer [CVE-2009-1965], Network Authentication [CVE-2009-1979, CVE-2009-1985], Oracle Spatial [CVE-2009-1994], Oracle Text [CVE-2009-1991], PL/SQL [CVE-2009-2001], RDBMS Data Pump [CVE-2009-1971], and Workspace Manager [CVE-2009-1018, CVE-2009-1964] components are affected.

The following researchers reported these and other Oracle vulnerabilities:

Yaniv Azaria of Imperva, Inc.; Cesar Cerrudo of Argeniss; Deniz Cevik of Intellect; Joxean Koret; Joxean Koret of iSIGHT Partners Global Vulnerability Partnership; Alexander Kornbrust of Red Database Security; David Litchfield of NGS Software; Ryan Permeh of McAfee Avert labs; Guy Pilosof of Sentrigo; Aviv Pode of Sentrigo; Alexandr Polyakov of Digital Security; Pawel Romanek of Asseco Business Solutions; Amichai Shulman of Imperva, Inc.; Rajat Swarup; Laszlo Toth; Luka Treiber of ACROS Security; Wei Wang of McAfee Avert labs; and Dennis Yurichev.

Impact:   On Windows-based systems, a remote user can take full control of the target database.

On Linux- and UNIX-based systems, a remote user can partially affect the confidentiality, integrity, and availability of the target database.

On all platforms, a remote authenticated user can partially affect the confidentiality, integrity, and availability of the target database.

Solution:   The vendor has issued a fix, described in their Oct 2009 Critical Patch Update advisory.

The Oracle advisory is available at:

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2009.html

Vendor URL:  www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2009.html (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), UNIX (Tru64), Windows (NT), Windows (2000), Windows (2003), Windows (XP)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC