---------------------------------------------------------------------- Secunia customers receive relevant and filtered advisories. Delivery is done via different channels including SMS, Email, Web, and https based XML feed. http://corporate.secunia.com/trial/38/request/ ---------------------------------------------------------------------- TITLE: Oracle Products Multiple Vulnerabilities SECUNIA ADVISORY ID: SA24929 VERIFY ADVISORY: http://secunia.com/advisories/24929/ CRITICAL: Highly critical IMPACT: Security Bypass, Cross Site Scripting, Manipulation of data, DoS, System access, Unknown WHERE: >From remote SOFTWARE: Oracle Database 10.x http://secunia.com/product/3387/ Oracle9i Database Enterprise Edition http://secunia.com/product/359/ Oracle9i Database Standard Edition http://secunia.com/product/358/ Oracle Secure Enterprise Search 10.x http://secunia.com/product/13978/ Oracle Application Server 10g http://secunia.com/product/3190/ Oracle Collaboration Suite 10.x http://secunia.com/product/2450/ Oracle E-Business Suite 11i http://secunia.com/product/442/ Oracle E-Business Suite 12.x http://secunia.com/product/13979/ Oracle Enterprise Manager 9.x http://secunia.com/product/2564/ Oracle PeopleSoft Enterprise Tools 8.x http://secunia.com/product/9411/ Oracle PeopleSoft Enterprise Human Capital Management 8.x http://secunia.com/product/13980/ JD Edwards EnterpriseOne Tools 8.x http://secunia.com/product/5940/ JD Edwards OneWorld Tools 8.x http://secunia.com/product/2948/ DESCRIPTION: Multiple vulnerabilities have been reported in various Oracle products. Some of these vulnerabilities have unknown impacts, while others can be exploited to bypass certain security restrictions, cause a DoS (Denial of Service), conduct cross-site scripting and SQL injection attacks, or potentially compromise a vulnerable system.. Details are available for the following vulnerabilities: 1) The Oracle TNS Listener can be caused to shut down by sending a "TNS STOP" command to the Oracle Discoverer Servlet. 2) Input passed to the "expType" in search/admin/sources/boundary_rules.jsp in Oracle Secure Enterprise Search is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 3) Certain input processed by the DBMS_AQADM_SYS and DBMS_UPGRADE_INTERNAL packages are not properly sanitised before being used in SQL queries. These can be exploited to manipulate SQL queries by injecting arbitary SQL code. 4) It is possible to bypass the Oracle database logon trigger. SOLUTION: Apply patches (see the vendor's advisory). PROVIDED AND/OR DISCOVERED BY: The vendor credits: * Vicente Aguilera Diaz, Internet Security Auditors, S.L. * Gerhard Eschelbeck, Qualys, Inc. * Esteban Martinez Fayo, Application Security, Inc. * Joxean Koret * Alexander Kornbrust, Red Database Security GmbH * David Litchfield and Paul M. Wright, NGSSoftware * noderat ratty * TippingPoint's Zero Day Initiative ORIGINAL ADVISORY: Oracle: http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2007.html Red Database Security: http://www.red-database-security.com/advisory/oracle_discoverer_servlet.html http://www.red-database-security.com/advisory/oracle_css_ses.html http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aqadm_sys.html http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_upgrade_internal.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------