---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Oracle Products Multiple Vulnerabilities SECUNIA ADVISORY ID: SA23794 VERIFY ADVISORY: http://secunia.com/advisories/23794/ CRITICAL: Highly critical IMPACT: Unknown, Cross Site Scripting, Manipulation of data, Exposure of sensitive information, DoS, System access WHERE: >From remote SOFTWARE: Oracle Database 10g http://secunia.com/product/3387/ Oracle Application Server 10g http://secunia.com/product/3190/ Oracle E-Business Suite 11i http://secunia.com/product/442/ Oracle Enterprise Manager 10.x http://secunia.com/product/2565/ Oracle PeopleSoft Enterprise Tools 8.x http://secunia.com/product/9411/ Oracle9i Database Enterprise Edition http://secunia.com/product/359/ Oracle9i Database Standard Edition http://secunia.com/product/358/ Oracle Developer Suite 10g http://secunia.com/product/5410/ Oracle9i Developer Suite http://secunia.com/product/5411/ Oracle9i Application Server http://secunia.com/product/443/ DESCRIPTION: Multiple vulnerabilities have been reported in various Oracle products. Some of these vulnerabilities have unknown impacts while others can be exploited to gain access to sensitive information, cause a DoS (Denial of Service), conduct cross-site scripting and SQL injection attacks, and potentially compromise a vulnerable system. Details are available for the following vulnerabilities: 1) A boundary error in the ONS (Oracle Notification Service) can be exploited to cause a buffer overflow via a specially crafted packet sent to the service (default port 6200/TCP). 2) Certain input processed by the Oracle XML DB is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 3) Certain input processed by the DBMS_AQ_INV package is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitary SQL code 4) An input validation error in EmChartBean can be exploited to access files outside of the web root via directory traversal attacks. Some vulnerabilities reported in various packages also affect certain Oracle products. For more information: SA22130 SA21709 SA22130 SOLUTION: Apply patches (see the vendor's advisory). PROVIDED AND/OR DISCOVERED BY: The vendor credits: * Andy Davis, Information Risk Management Plc * Vicente Aguilera Diaz, Internet Security Auditors, S.L. * Esteban Martinez Fayo, Application Security, Inc. * Tony Fogarty, BT Global Services * Oliver Karow, Symantec Vulnerability Research * Joxean Koret * Alexander Kornbrust, Red Database Security * David Litchfield and Mark Litchfield, NGSSoftware * noderat ratty. ORIGINAL ADVISORY: Oracle: http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html Red Database Security: http://www.red-database-security.com/advisory/oracle_buffer_overflow_ons.html http://www.red-database-security.com/advisory/oracle_xmldb_css2.html http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aq_inv.html Symantec Vulnerability Research: http://www.symantec.com/enterprise/research/SYMSA-2007-001.txt OTHER REFERENCES: SA22130: http://secunia.com/advisories/22130 SA21709: http://secunia.com/advisories/21709 SA22130: http://secunia.com/advisories/22130 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------